Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.219.229.247
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62302
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.219.229.247.		IN	A

;; AUTHORITY SECTION:
.			59	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 07:43:47 CST 2022
;; MSG SIZE  rcvd: 108
Host info
247.229.219.138.in-addr.arpa domain name pointer host229-247.netgroup.cl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
247.229.219.138.in-addr.arpa	name = host229-247.netgroup.cl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
182.75.216.190 attackbotsspam
2020-05-27T15:21:00.746218server.mjenks.net sshd[1916406]: Failed password for invalid user a from 182.75.216.190 port 55059 ssh2
2020-05-27T15:24:27.051839server.mjenks.net sshd[1916801]: Invalid user student from 182.75.216.190 port 51274
2020-05-27T15:24:27.059216server.mjenks.net sshd[1916801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.75.216.190
2020-05-27T15:24:27.051839server.mjenks.net sshd[1916801]: Invalid user student from 182.75.216.190 port 51274
2020-05-27T15:24:29.408800server.mjenks.net sshd[1916801]: Failed password for invalid user student from 182.75.216.190 port 51274 ssh2
...
2020-05-28 07:31:16
27.255.57.167 attack
Unauthorized connection attempt from IP address 27.255.57.167 on Port 445(SMB)
2020-05-28 07:24:43
41.33.9.3 attack
Unauthorized connection attempt from IP address 41.33.9.3 on Port 445(SMB)
2020-05-28 07:08:35
147.135.157.67 attackspam
SSH Bruteforce Attempt (failed auth)
2020-05-28 06:59:04
192.162.70.66 attackbots
prod6
...
2020-05-28 07:07:03
167.172.98.198 attackspam
2020-05-28T00:53:44.845371vps773228.ovh.net sshd[30777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.98.198
2020-05-28T00:53:44.831819vps773228.ovh.net sshd[30777]: Invalid user hugo from 167.172.98.198 port 59000
2020-05-28T00:53:47.168912vps773228.ovh.net sshd[30777]: Failed password for invalid user hugo from 167.172.98.198 port 59000 ssh2
2020-05-28T00:56:14.826863vps773228.ovh.net sshd[30837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.98.198  user=root
2020-05-28T00:56:16.743659vps773228.ovh.net sshd[30837]: Failed password for root from 167.172.98.198 port 47584 ssh2
...
2020-05-28 07:31:41
123.207.249.145 attackspam
Invalid user vhp from 123.207.249.145 port 58904
2020-05-28 07:21:02
189.243.210.114 attackspam
Unauthorized connection attempt from IP address 189.243.210.114 on Port 445(SMB)
2020-05-28 07:22:34
143.208.56.143 attackbots
Unauthorized connection attempt from IP address 143.208.56.143 on Port 445(SMB)
2020-05-28 07:24:16
49.232.148.100 attack
May 27 20:24:02 124388 sshd[2048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.148.100
May 27 20:24:02 124388 sshd[2048]: Invalid user administrator from 49.232.148.100 port 49448
May 27 20:24:04 124388 sshd[2048]: Failed password for invalid user administrator from 49.232.148.100 port 49448 ssh2
May 27 20:27:12 124388 sshd[2061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.148.100  user=root
May 27 20:27:14 124388 sshd[2061]: Failed password for root from 49.232.148.100 port 46724 ssh2
2020-05-28 06:54:48
91.234.62.28 attackspam
Automatic report - Banned IP Access
2020-05-28 07:22:47
109.86.194.177 attack
2020-05-28T04:03:37.038666vivaldi2.tree2.info sshd[2365]: Invalid user username from 109.86.194.177
2020-05-28T04:03:37.051776vivaldi2.tree2.info sshd[2365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.86.194.177
2020-05-28T04:03:37.038666vivaldi2.tree2.info sshd[2365]: Invalid user username from 109.86.194.177
2020-05-28T04:03:38.915821vivaldi2.tree2.info sshd[2365]: Failed password for invalid user username from 109.86.194.177 port 53572 ssh2
2020-05-28T04:06:35.444927vivaldi2.tree2.info sshd[2487]: Invalid user adi from 109.86.194.177
...
2020-05-28 07:10:13
92.46.110.2 attack
Unauthorized connection attempt from IP address 92.46.110.2 on Port 445(SMB)
2020-05-28 07:20:06
185.170.114.25 attackspambots
May 27 22:52:12 melroy-server sshd[30065]: Failed password for root from 185.170.114.25 port 38037 ssh2
May 27 22:52:17 melroy-server sshd[30065]: Failed password for root from 185.170.114.25 port 38037 ssh2
...
2020-05-28 06:54:33
35.200.161.135 attack
Invalid user scrollkeeper from 35.200.161.135 port 60596
2020-05-28 07:11:07

Recently Reported IPs

138.219.231.113 118.175.251.72 138.219.235.246 138.219.237.124
10.57.191.28 138.219.244.137 138.219.244.164 138.219.246.66
138.219.246.82 138.219.244.98 138.219.244.172 138.219.246.223
138.219.246.118 138.219.246.86 138.219.246.84 118.175.252.205
138.219.247.226 138.219.247.209 138.219.247.62 138.219.247.22