Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Austria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.22.44.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4880
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.22.44.216.			IN	A

;; AUTHORITY SECTION:
.			111	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021501 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 16 03:03:18 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 216.44.22.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 216.44.22.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
101.254.185.118 attackspam
Sep  3 02:52:19 site2 sshd\[18929\]: Failed password for root from 101.254.185.118 port 57024 ssh2Sep  3 02:56:33 site2 sshd\[19040\]: Invalid user clark from 101.254.185.118Sep  3 02:56:34 site2 sshd\[19040\]: Failed password for invalid user clark from 101.254.185.118 port 39396 ssh2Sep  3 03:01:05 site2 sshd\[19176\]: Invalid user db2fenc from 101.254.185.118Sep  3 03:01:07 site2 sshd\[19176\]: Failed password for invalid user db2fenc from 101.254.185.118 port 49992 ssh2
...
2019-09-03 08:11:26
41.65.197.162 attackbotsspam
09/02/2019-19:12:39.308768 41.65.197.162 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-03 08:03:04
106.12.206.253 attackspam
Sep  3 01:31:49 debian sshd\[31758\]: Invalid user vcsa from 106.12.206.253 port 59656
Sep  3 01:31:49 debian sshd\[31758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.206.253
...
2019-09-03 08:43:21
167.114.226.137 attackbots
Sep  3 00:33:09 hcbbdb sshd\[31399\]: Invalid user valeria from 167.114.226.137
Sep  3 00:33:09 hcbbdb sshd\[31399\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.226.137
Sep  3 00:33:10 hcbbdb sshd\[31399\]: Failed password for invalid user valeria from 167.114.226.137 port 58021 ssh2
Sep  3 00:37:08 hcbbdb sshd\[31825\]: Invalid user appldisc from 167.114.226.137
Sep  3 00:37:08 hcbbdb sshd\[31825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.226.137
2019-09-03 08:41:54
165.22.123.146 attackbots
Sep  2 13:52:38 lcdev sshd\[15348\]: Invalid user pace from 165.22.123.146
Sep  2 13:52:38 lcdev sshd\[15348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.123.146
Sep  2 13:52:41 lcdev sshd\[15348\]: Failed password for invalid user pace from 165.22.123.146 port 38490 ssh2
Sep  2 13:56:39 lcdev sshd\[16359\]: Invalid user nexus from 165.22.123.146
Sep  2 13:56:39 lcdev sshd\[16359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.123.146
2019-09-03 08:11:00
46.101.41.162 attackbotsspam
Sep  3 03:18:43 www1 sshd\[14751\]: Invalid user james from 46.101.41.162Sep  3 03:18:45 www1 sshd\[14751\]: Failed password for invalid user james from 46.101.41.162 port 47546 ssh2Sep  3 03:22:31 www1 sshd\[15192\]: Invalid user gianni from 46.101.41.162Sep  3 03:22:32 www1 sshd\[15192\]: Failed password for invalid user gianni from 46.101.41.162 port 35722 ssh2Sep  3 03:26:25 www1 sshd\[15716\]: Invalid user magenta from 46.101.41.162Sep  3 03:26:28 www1 sshd\[15716\]: Failed password for invalid user magenta from 46.101.41.162 port 52136 ssh2
...
2019-09-03 08:44:18
24.139.218.218 attack
" "
2019-09-03 08:23:58
62.99.71.94 attackspambots
Sep  3 01:08:14 ubuntu-2gb-nbg1-dc3-1 sshd[405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.99.71.94
Sep  3 01:08:16 ubuntu-2gb-nbg1-dc3-1 sshd[405]: Failed password for invalid user sinusbot from 62.99.71.94 port 44318 ssh2
...
2019-09-03 08:31:19
106.75.216.98 attack
Sep  2 14:35:17 web1 sshd\[17380\]: Invalid user psrao from 106.75.216.98
Sep  2 14:35:17 web1 sshd\[17380\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.216.98
Sep  2 14:35:19 web1 sshd\[17380\]: Failed password for invalid user psrao from 106.75.216.98 port 57552 ssh2
Sep  2 14:40:03 web1 sshd\[17963\]: Invalid user odbc from 106.75.216.98
Sep  2 14:40:03 web1 sshd\[17963\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.216.98
2019-09-03 08:40:20
212.87.9.155 attackspambots
Sep  3 00:08:58 web8 sshd\[30752\]: Invalid user lpchao from 212.87.9.155
Sep  3 00:08:58 web8 sshd\[30752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.87.9.155
Sep  3 00:08:59 web8 sshd\[30752\]: Failed password for invalid user lpchao from 212.87.9.155 port 34184 ssh2
Sep  3 00:13:09 web8 sshd\[32735\]: Invalid user web from 212.87.9.155
Sep  3 00:13:09 web8 sshd\[32735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.87.9.155
2019-09-03 08:21:52
85.38.99.3 attack
" "
2019-09-03 08:40:45
218.95.182.76 attackspam
Sep  3 00:08:36 mail sshd\[22529\]: Invalid user jd from 218.95.182.76 port 55136
Sep  3 00:08:36 mail sshd\[22529\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.95.182.76
...
2019-09-03 08:15:11
218.211.171.143 attackspam
Sep  2 13:59:59 wbs sshd\[16572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.211.171.143  user=root
Sep  2 14:00:01 wbs sshd\[16572\]: Failed password for root from 218.211.171.143 port 58884 ssh2
Sep  2 14:04:48 wbs sshd\[16929\]: Invalid user celery from 218.211.171.143
Sep  2 14:04:48 wbs sshd\[16929\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.211.171.143
Sep  2 14:04:50 wbs sshd\[16929\]: Failed password for invalid user celery from 218.211.171.143 port 47046 ssh2
2019-09-03 08:17:21
171.84.2.33 attackspam
Sep  3 01:57:49 markkoudstaal sshd[17355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.84.2.33
Sep  3 01:57:52 markkoudstaal sshd[17355]: Failed password for invalid user carla from 171.84.2.33 port 17234 ssh2
Sep  3 02:02:26 markkoudstaal sshd[17777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.84.2.33
2019-09-03 08:17:41
73.59.165.164 attackspam
Sep  2 20:38:41 plusreed sshd[7768]: Invalid user carmen from 73.59.165.164
...
2019-09-03 08:39:22

Recently Reported IPs

56.229.66.217 249.145.52.42 240.141.141.62 114.128.60.99
216.56.34.58 190.114.129.125 1.165.59.161 107.50.116.212
171.144.23.95 20.53.35.251 8.231.108.220 5.25.16.160
210.87.168.148 86.195.167.236 108.160.132.12 188.114.96.7
49.3.157.186 149.27.240.14 247.210.71.51 91.71.147.41