Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.209.214.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48405
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.209.214.8.			IN	A

;; AUTHORITY SECTION:
.			268	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024052800 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 28 14:02:24 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 8.214.209.138.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 8.214.209.138.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
172.126.50.178 attack
Telnet/23 MH Probe, BF, Hack -
2020-02-13 07:49:25
185.189.151.73 attack
trying to access non-authorized port
2020-02-13 07:17:54
14.140.210.30 attackspam
1581545978 - 02/12/2020 23:19:38 Host: 14.140.210.30/14.140.210.30 Port: 445 TCP Blocked
2020-02-13 07:21:05
201.204.81.50 attackbotsspam
Invalid user jzc from 201.204.81.50 port 48128
2020-02-13 07:41:34
187.19.207.211 attackspam
Unauthorized IMAP connection attempt
2020-02-13 07:27:53
206.189.47.166 attackspam
Feb 13 00:04:54 silence02 sshd[20713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.47.166
Feb 13 00:04:56 silence02 sshd[20713]: Failed password for invalid user document from 206.189.47.166 port 43172 ssh2
Feb 13 00:08:09 silence02 sshd[21009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.47.166
2020-02-13 07:15:50
114.35.33.109 attackspam
Fail2Ban Ban Triggered
2020-02-13 07:35:50
220.134.235.149 attackspambots
Telnet/23 MH Probe, BF, Hack -
2020-02-13 07:15:38
120.133.236.138 attackspam
Invalid user ykn from 120.133.236.138 port 57066
2020-02-13 07:14:25
190.56.229.42 attack
Invalid user pms from 190.56.229.42 port 53050
2020-02-13 07:36:01
118.71.80.202 attackspam
Fail2Ban Ban Triggered
2020-02-13 07:34:29
51.75.160.215 attackbots
Feb 12 18:10:43 plusreed sshd[10149]: Invalid user saumitra from 51.75.160.215
...
2020-02-13 07:13:31
74.222.24.78 attackbots
Feb 12 13:13:52 auw2 sshd\[17561\]: Invalid user FELDTECH from 74.222.24.78
Feb 12 13:13:52 auw2 sshd\[17561\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=server15.perfectip.net
Feb 12 13:13:54 auw2 sshd\[17561\]: Failed password for invalid user FELDTECH from 74.222.24.78 port 52040 ssh2
Feb 12 13:16:22 auw2 sshd\[17837\]: Invalid user password from 74.222.24.78
Feb 12 13:16:22 auw2 sshd\[17837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=server15.perfectip.net
2020-02-13 07:50:15
191.232.163.135 attackspambots
Invalid user roundy from 191.232.163.135 port 45500
2020-02-13 07:18:48
45.125.66.133 attackspambots
Rude login attack (5 tries in 1d)
2020-02-13 07:44:18

Recently Reported IPs

235.104.169.248 210.181.233.249 191.21.221.244 13.122.139.48
42.184.98.59 100.83.229.86 98.95.170.132 55.189.80.57
156.117.76.206 107.224.248.231 126.161.221.7 72.201.175.163
101.4.111.15 72.139.23.31 206.251.219.67 48.135.63.86
78.184.128.114 185.177.128.151 94.158.80.81 93.101.158.153