Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.6.93.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50530
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.6.93.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012802 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 06:17:33 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 12.93.6.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.93.6.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.246.121.218 attack
Jul 30 05:50:50 root sshd[23595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.246.121.218 
Jul 30 05:50:51 root sshd[23595]: Failed password for invalid user wangdc from 222.246.121.218 port 51347 ssh2
Jul 30 05:51:05 root sshd[23650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.246.121.218 
...
2020-07-30 16:36:56
195.159.234.190 attackspambots
Jul 30 06:59:56 eventyay sshd[1053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.159.234.190
Jul 30 06:59:58 eventyay sshd[1053]: Failed password for invalid user fork1 from 195.159.234.190 port 44612 ssh2
Jul 30 07:03:03 eventyay sshd[1249]: Failed password for root from 195.159.234.190 port 43073 ssh2
...
2020-07-30 17:00:36
104.224.187.120 attackspambots
Jul 30 08:24:29 vps639187 sshd\[3533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.224.187.120  user=root
Jul 30 08:24:31 vps639187 sshd\[3533\]: Failed password for root from 104.224.187.120 port 33550 ssh2
Jul 30 08:28:52 vps639187 sshd\[3648\]: Invalid user lry from 104.224.187.120 port 32946
Jul 30 08:28:52 vps639187 sshd\[3648\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.224.187.120
...
2020-07-30 16:45:26
217.111.239.37 attackspambots
Jul 30 08:44:20 melroy-server sshd[28117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.111.239.37 
Jul 30 08:44:22 melroy-server sshd[28117]: Failed password for invalid user rhdan from 217.111.239.37 port 35388 ssh2
...
2020-07-30 16:50:20
36.133.48.222 attackbots
SSH Brute Force
2020-07-30 16:43:18
62.14.242.34 attackbots
(sshd) Failed SSH login from 62.14.242.34 (ES/Spain/34.242.14.62.static.jazztel.es): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 30 08:53:39 elude sshd[27926]: Invalid user fisnet from 62.14.242.34 port 42734
Jul 30 08:53:41 elude sshd[27926]: Failed password for invalid user fisnet from 62.14.242.34 port 42734 ssh2
Jul 30 08:58:24 elude sshd[28671]: Invalid user wzmao from 62.14.242.34 port 53799
Jul 30 08:58:26 elude sshd[28671]: Failed password for invalid user wzmao from 62.14.242.34 port 53799 ssh2
Jul 30 09:02:32 elude sshd[29323]: Invalid user tanmp from 62.14.242.34 port 60505
2020-07-30 16:59:07
222.186.175.215 attackbotsspam
Brute-force attempt banned
2020-07-30 16:27:10
103.98.17.10 attackbots
Jul 30 09:18:27 rocket sshd[27627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.98.17.10
Jul 30 09:18:29 rocket sshd[27627]: Failed password for invalid user mc from 103.98.17.10 port 47032 ssh2
Jul 30 09:22:59 rocket sshd[28400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.98.17.10
...
2020-07-30 16:29:12
152.136.212.92 attackbots
Jul 30 08:58:45 sshgateway sshd\[26856\]: Invalid user zangbenliang from 152.136.212.92
Jul 30 08:58:45 sshgateway sshd\[26856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.212.92
Jul 30 08:58:48 sshgateway sshd\[26856\]: Failed password for invalid user zangbenliang from 152.136.212.92 port 59284 ssh2
2020-07-30 16:41:45
187.178.159.31 attackbots
port scan and connect, tcp 23 (telnet)
2020-07-30 16:47:10
105.242.68.202 attack
Unauthorized connection attempt detected from IP address 105.242.68.202 to port 23
2020-07-30 16:39:08
183.101.8.110 attack
Jul 30 10:27:03  sshd\[10364\]: Invalid user spring from 183.101.8.110Jul 30 10:27:05  sshd\[10364\]: Failed password for invalid user spring from 183.101.8.110 port 46384 ssh2
...
2020-07-30 16:44:01
111.230.204.113 attackbotsspam
Jul 30 14:18:31 dhoomketu sshd[2025604]: Invalid user yuanyujie from 111.230.204.113 port 36804
Jul 30 14:18:31 dhoomketu sshd[2025604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.204.113 
Jul 30 14:18:31 dhoomketu sshd[2025604]: Invalid user yuanyujie from 111.230.204.113 port 36804
Jul 30 14:18:34 dhoomketu sshd[2025604]: Failed password for invalid user yuanyujie from 111.230.204.113 port 36804 ssh2
Jul 30 14:20:25 dhoomketu sshd[2025624]: Invalid user riak from 111.230.204.113 port 56148
...
2020-07-30 17:01:01
59.163.102.4 attack
Jul 30 10:41:54 haigwepa sshd[7076]: Failed password for mysql from 59.163.102.4 port 48244 ssh2
...
2020-07-30 16:54:40
58.250.164.246 attack
(sshd) Failed SSH login from 58.250.164.246 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 30 09:03:46 amsweb01 sshd[29509]: Invalid user longran from 58.250.164.246 port 54978
Jul 30 09:03:48 amsweb01 sshd[29509]: Failed password for invalid user longran from 58.250.164.246 port 54978 ssh2
Jul 30 09:15:21 amsweb01 sshd[31073]: Invalid user llw from 58.250.164.246 port 58244
Jul 30 09:15:23 amsweb01 sshd[31073]: Failed password for invalid user llw from 58.250.164.246 port 58244 ssh2
Jul 30 09:20:31 amsweb01 sshd[31845]: Invalid user modb from 58.250.164.246 port 59466
2020-07-30 17:01:29

Recently Reported IPs

196.52.129.230 170.74.69.110 234.204.218.190 154.38.28.16
214.196.174.234 90.99.244.116 93.103.117.105 87.171.139.98
170.29.172.61 62.116.9.90 141.135.72.203 240.36.24.41
53.143.16.70 161.176.42.157 51.78.88.8 19.58.196.209
121.219.5.226 223.128.81.134 147.239.33.7 139.143.142.134