Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Munich

Region: Bavaria

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.245.194.67
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40621
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.245.194.67.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081401 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Aug 15 19:21:42 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 67.194.245.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 67.194.245.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
88.28.195.181 attack
Unauthorized connection attempt detected from IP address 88.28.195.181 to port 445
2020-06-01 00:49:51
186.135.89.25 attackspam
Unauthorized connection attempt detected from IP address 186.135.89.25 to port 23
2020-06-01 00:34:13
113.108.177.194 attack
 TCP (SYN) 113.108.177.194:50872 -> port 445, len 52
2020-06-01 00:44:45
69.175.97.170 attack
 TCP (SYN) 69.175.97.170:42452 -> port 23, len 44
2020-06-01 00:54:55
177.105.192.236 attackspambots
Unauthorized connection attempt detected from IP address 177.105.192.236 to port 23
2020-06-01 00:38:15
182.149.187.136 attackspambots
Unauthorized connection attempt detected from IP address 182.149.187.136 to port 445
2020-06-01 00:36:42
222.186.180.130 attackbots
May 31 18:22:47 vps639187 sshd\[5552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130  user=root
May 31 18:22:49 vps639187 sshd\[5552\]: Failed password for root from 222.186.180.130 port 38673 ssh2
May 31 18:22:52 vps639187 sshd\[5552\]: Failed password for root from 222.186.180.130 port 38673 ssh2
...
2020-06-01 00:24:30
49.88.112.115 attackspam
2020-06-01T01:45:57.876244vivaldi2.tree2.info sshd[7290]: refused connect from 49.88.112.115 (49.88.112.115)
2020-06-01T01:46:49.181861vivaldi2.tree2.info sshd[7314]: refused connect from 49.88.112.115 (49.88.112.115)
2020-06-01T01:47:38.826115vivaldi2.tree2.info sshd[7338]: refused connect from 49.88.112.115 (49.88.112.115)
2020-06-01T01:48:29.815012vivaldi2.tree2.info sshd[7390]: refused connect from 49.88.112.115 (49.88.112.115)
2020-06-01T01:49:19.709552vivaldi2.tree2.info sshd[7408]: refused connect from 49.88.112.115 (49.88.112.115)
...
2020-06-01 00:58:41
165.22.159.240 attackbots
Unauthorized connection attempt detected from IP address 165.22.159.240 to port 5902
2020-06-01 00:40:45
190.64.91.42 attackspam
Unauthorized connection attempt detected from IP address 190.64.91.42 to port 445
2020-06-01 00:32:40
221.147.59.20 attackspambots
Unauthorized connection attempt detected from IP address 221.147.59.20 to port 23
2020-06-01 00:26:31
61.133.118.6 attackspam
Unauthorized connection attempt detected from IP address 61.133.118.6 to port 3389
2020-06-01 00:57:44
108.178.61.58 attack
 TCP (SYN) 108.178.61.58:13622 -> port 8099, len 44
2020-06-01 00:46:23
197.255.254.147 attackspam
Unauthorized connection attempt detected from IP address 197.255.254.147 to port 445
2020-06-01 00:31:43
43.247.184.39 attackbotsspam
 TCP (SYN) 43.247.184.39:52813 -> port 1433, len 44
2020-06-01 01:00:52

Recently Reported IPs

217.182.77.186 121.33.36.51 41.90.9.158 228.138.189.180
143.0.140.92 90.40.141.18 95.30.212.22 114.151.67.67
35.199.104.60 191.53.116.191 77.40.3.204 67.227.237.177
45.82.35.195 177.44.25.102 89.104.76.42 173.208.36.222
180.167.233.251 184.235.238.11 141.237.70.120 107.179.9.154