Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Munich

Region: Bavaria

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.245.9.38
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31763
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.245.9.38.			IN	A

;; AUTHORITY SECTION:
.			552	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051202 1800 900 604800 86400

;; Query time: 109 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 13 10:32:12 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 38.9.245.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 38.9.245.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
121.164.233.154 attackspam
$f2bV_matches
2020-01-12 03:52:02
119.28.223.130 attackspambots
$f2bV_matches
2020-01-12 04:20:07
121.164.34.90 attackspambots
$f2bV_matches
2020-01-12 03:51:46
119.28.176.26 attackbots
Invalid user kem from 119.28.176.26 port 58656
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.176.26
Failed password for invalid user kem from 119.28.176.26 port 58656 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.176.26  user=root
Failed password for root from 119.28.176.26 port 34740 ssh2
2020-01-12 04:20:20
118.189.72.2 attack
firewall-block, port(s): 37215/tcp
2020-01-12 04:09:39
119.29.87.183 attackspambots
$f2bV_matches
2020-01-12 04:15:16
120.89.64.8 attack
Jan 11 17:20:23 master sshd[22350]: Failed password for invalid user Raisa from 120.89.64.8 port 51714 ssh2
Jan 11 17:30:57 master sshd[22722]: Failed password for root from 120.89.64.8 port 43156 ssh2
Jan 11 17:37:04 master sshd[22757]: Failed password for invalid user thulani from 120.89.64.8 port 45520 ssh2
Jan 11 17:40:43 master sshd[22827]: Failed password for root from 120.89.64.8 port 47864 ssh2
Jan 11 17:44:22 master sshd[22864]: Failed password for root from 120.89.64.8 port 50210 ssh2
Jan 11 17:48:11 master sshd[22895]: Failed password for root from 120.89.64.8 port 52566 ssh2
2020-01-12 04:01:19
120.132.116.86 attack
Jan 11 16:46:55 firewall sshd[1429]: Invalid user webadmin from 120.132.116.86
Jan 11 16:46:57 firewall sshd[1429]: Failed password for invalid user webadmin from 120.132.116.86 port 54864 ssh2
Jan 11 16:48:41 firewall sshd[1468]: Invalid user fws from 120.132.116.86
...
2020-01-12 04:08:14
138.197.198.27 attackbotsspam
WordPress login Brute force / Web App Attack on client site.
2020-01-12 04:03:17
121.200.61.36 attackspam
$f2bV_matches
2020-01-12 03:47:26
120.92.35.127 attackbots
SSH Brute Force
2020-01-12 04:00:56
115.74.201.97 attack
2020-01-12T00:06:50.574437luisaranguren sshd[3724241]: Connection from 115.74.201.97 port 51455 on 10.10.10.6 port 22 rdomain ""
2020-01-12T00:06:56.525049luisaranguren sshd[3724241]: Invalid user user from 115.74.201.97 port 51455
2020-01-12T00:06:56.806318luisaranguren sshd[3724241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.74.201.97
2020-01-12T00:06:50.574437luisaranguren sshd[3724241]: Connection from 115.74.201.97 port 51455 on 10.10.10.6 port 22 rdomain ""
2020-01-12T00:06:56.525049luisaranguren sshd[3724241]: Invalid user user from 115.74.201.97 port 51455
2020-01-12T00:06:58.201426luisaranguren sshd[3724241]: Failed password for invalid user user from 115.74.201.97 port 51455 ssh2
...
2020-01-12 04:14:44
119.200.186.168 attackbots
Jan 11 19:13:19 hosting180 sshd[22122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.200.186.168  user=root
Jan 11 19:13:21 hosting180 sshd[22122]: Failed password for root from 119.200.186.168 port 58118 ssh2
...
2020-01-12 04:23:12
121.229.30.16 attack
$f2bV_matches
2020-01-12 03:46:16
120.92.173.154 attack
SSH invalid-user multiple login attempts
2020-01-12 04:00:38

Recently Reported IPs

149.49.243.226 165.33.151.89 183.104.213.169 240.164.222.93
24.183.6.162 199.185.178.81 207.148.81.232 246.52.16.153
208.235.169.40 107.88.188.69 102.161.80.212 83.254.126.68
61.242.134.190 158.173.47.21 44.188.246.195 194.5.52.198
224.156.229.126 183.116.170.114 33.111.33.194 52.93.168.111