Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.81.212.233
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52297
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.81.212.233.			IN	A

;; AUTHORITY SECTION:
.			378	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010702 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 08 10:27:59 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 233.212.81.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 233.212.81.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
89.100.21.40 attackspam
Jul 27 10:35:55 vibhu-HP-Z238-Microtower-Workstation sshd\[1302\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.100.21.40  user=root
Jul 27 10:35:56 vibhu-HP-Z238-Microtower-Workstation sshd\[1302\]: Failed password for root from 89.100.21.40 port 52028 ssh2
Jul 27 10:40:46 vibhu-HP-Z238-Microtower-Workstation sshd\[1528\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.100.21.40  user=root
Jul 27 10:40:48 vibhu-HP-Z238-Microtower-Workstation sshd\[1528\]: Failed password for root from 89.100.21.40 port 46766 ssh2
Jul 27 10:45:28 vibhu-HP-Z238-Microtower-Workstation sshd\[1679\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.100.21.40  user=root
...
2019-07-27 13:18:29
106.13.82.49 attackspambots
Jul 26 22:20:10 localhost sshd\[6482\]: Invalid user twine from 106.13.82.49 port 57352
Jul 26 22:20:10 localhost sshd\[6482\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.82.49
Jul 26 22:20:12 localhost sshd\[6482\]: Failed password for invalid user twine from 106.13.82.49 port 57352 ssh2
2019-07-27 13:03:06
200.164.217.210 attackspam
SSH Brute-Forcing (ownc)
2019-07-27 13:55:47
138.197.3.246 attackbotsspam
Automatic report - SSH Brute-Force Attack
2019-07-27 13:09:10
104.229.105.140 attack
Invalid user oracle from 104.229.105.140 port 45010
2019-07-27 12:47:35
181.48.154.98 attack
proto=tcp  .  spt=49633  .  dpt=25  .     (listed on Blocklist de  Jul 26)     (288)
2019-07-27 13:48:56
62.252.213.72 attackbots
[DoS Attack: ACK Scan] from source: 62.252.213.72, port 443, Friday, July 26,2019 22:59:43
2019-07-27 13:50:57
46.146.203.170 attack
scan z
2019-07-27 12:49:08
24.54.217.182 attackspambots
Automatic report - Port Scan Attack
2019-07-27 13:07:33
114.247.177.155 attackbotsspam
Jul 26 23:45:59 MK-Soft-VM3 sshd\[7423\]: Invalid user idc159357 from 114.247.177.155 port 54282
Jul 26 23:45:59 MK-Soft-VM3 sshd\[7423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.247.177.155
Jul 26 23:46:01 MK-Soft-VM3 sshd\[7423\]: Failed password for invalid user idc159357 from 114.247.177.155 port 54282 ssh2
...
2019-07-27 12:51:26
222.255.174.201 attack
TCP port 445 (SMB) attempt blocked by firewall. [2019-07-27 07:14:08]
2019-07-27 13:25:13
119.27.189.222 attackspam
Jul 26 11:09:38 vtv3 sshd\[21780\]: Invalid user marwan from 119.27.189.222 port 57210
Jul 26 11:09:38 vtv3 sshd\[21780\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.27.189.222
Jul 26 11:09:41 vtv3 sshd\[21780\]: Failed password for invalid user marwan from 119.27.189.222 port 57210 ssh2
Jul 26 11:15:02 vtv3 sshd\[24871\]: Invalid user iii from 119.27.189.222 port 47922
Jul 26 11:15:02 vtv3 sshd\[24871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.27.189.222
Jul 26 11:25:32 vtv3 sshd\[31270\]: Invalid user ff from 119.27.189.222 port 57578
Jul 26 11:25:32 vtv3 sshd\[31270\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.27.189.222
Jul 26 11:25:34 vtv3 sshd\[31270\]: Failed password for invalid user ff from 119.27.189.222 port 57578 ssh2
Jul 26 11:30:52 vtv3 sshd\[1818\]: Invalid user johny from 119.27.189.222 port 48290
Jul 26 11:30:52 vtv3 sshd\[1818\]: pam_
2019-07-27 13:16:09
165.22.73.160 attackspam
Jul 27 04:13:53 vps647732 sshd[14885]: Failed password for root from 165.22.73.160 port 35634 ssh2
...
2019-07-27 12:46:16
2.76.234.78 attack
utm - spam
2019-07-27 13:28:31
195.181.216.44 attack
Jul 27 06:14:58 debian sshd\[27371\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.181.216.44  user=root
Jul 27 06:15:00 debian sshd\[27371\]: Failed password for root from 195.181.216.44 port 48056 ssh2
...
2019-07-27 13:41:10

Recently Reported IPs

5.109.75.29 101.26.31.33 192.80.196.86 185.60.62.151
57.31.24.124 229.251.166.228 8.42.117.149 83.119.219.157
64.81.44.41 105.214.22.29 240.118.95.226 83.179.19.221
102.8.102.23 155.239.10.48 162.46.199.124 56.98.235.148
210.188.111.134 68.200.253.39 247.177.189.118 109.166.25.254