Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.47.122.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14019
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.47.122.244.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 08:58:59 CST 2025
;; MSG SIZE  rcvd: 107
Host info
244.122.47.138.in-addr.arpa domain name pointer aswell-244.resnet.LaTech.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
244.122.47.138.in-addr.arpa	name = aswell-244.resnet.LaTech.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
37.120.142.154 attackbots
0,34-01/01 [bc00/m65] concatform PostRequest-Spammer scoring: berlin
2019-09-12 02:59:25
185.176.27.54 attackspam
Sep 10 17:00:52 lenivpn01 kernel: \[360456.912614\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.54 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=16409 PROTO=TCP SPT=58151 DPT=34000 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 10 22:47:53 lenivpn01 kernel: \[381277.188024\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.54 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=49229 PROTO=TCP SPT=58151 DPT=33999 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 11 04:34:50 lenivpn01 kernel: \[402094.261883\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.54 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=26176 PROTO=TCP SPT=55171 DPT=34099 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 11 07:41:30 lenivpn01 kernel: \[413293.003257\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.54 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=244 
...
2019-09-12 02:22:47
185.176.27.98 attackspambots
Port scan on 3 port(s): 34192 34193 34194
2019-09-12 02:22:21
212.87.9.141 attack
SSH bruteforce (Triggered fail2ban)
2019-09-12 02:45:35
71.6.146.185 attackbotsspam
Portscan or hack attempt detected by psad/fwsnort
2019-09-12 02:34:19
82.221.105.6 attackbots
Portscan or hack attempt detected by psad/fwsnort
2019-09-12 02:29:17
198.108.67.58 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-09-12 02:18:59
42.157.131.201 attackspambots
Sep 11 01:04:05 friendsofhawaii sshd\[7732\]: Invalid user 119 from 42.157.131.201
Sep 11 01:04:05 friendsofhawaii sshd\[7732\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.157.131.201
Sep 11 01:04:07 friendsofhawaii sshd\[7732\]: Failed password for invalid user 119 from 42.157.131.201 port 42794 ssh2
Sep 11 01:08:16 friendsofhawaii sshd\[8093\]: Invalid user 162 from 42.157.131.201
Sep 11 01:08:16 friendsofhawaii sshd\[8093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.157.131.201
2019-09-12 02:37:03
185.176.27.162 attackspam
Port scan: Attack repeated for 24 hours
2019-09-12 02:20:59
198.108.67.35 attackbots
09/11/2019-11:36:22.978099 198.108.67.35 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-09-12 02:19:32
156.211.192.156 attackbots
Sep 11 09:49:43 [munged] sshd[13253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.211.192.156
2019-09-12 02:53:02
173.225.102.74 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-11 17:08:22,588 INFO [amun_request_handler] unknown vuln (Attacker: 173.225.102.74 Port: 25, Mess: ['QUIT
'] (6) Stages: ['IMAIL_STAGE2'])
2019-09-12 02:52:35
122.161.192.206 attack
Sep 11 20:33:17 MK-Soft-Root1 sshd\[30473\]: Invalid user support from 122.161.192.206 port 57446
Sep 11 20:33:17 MK-Soft-Root1 sshd\[30473\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.161.192.206
Sep 11 20:33:20 MK-Soft-Root1 sshd\[30473\]: Failed password for invalid user support from 122.161.192.206 port 57446 ssh2
...
2019-09-12 02:38:18
80.82.78.104 attackbotsspam
2 attempts last 24 Hours
2019-09-12 02:30:42
185.204.217.97 attack
SSHScan
2019-09-12 03:02:11

Recently Reported IPs

177.29.250.80 185.167.211.96 27.47.238.184 192.56.101.153
250.191.182.159 147.248.48.182 131.102.68.210 167.135.131.59
122.109.229.21 126.57.133.45 226.62.18.124 50.146.216.44
72.80.75.106 19.205.128.86 161.115.93.201 232.150.0.21
122.244.89.52 224.232.159.40 89.124.210.248 118.48.105.224