Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.94.172.160
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33908
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.94.172.160.			IN	A

;; AUTHORITY SECTION:
.			364	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 07:54:57 CST 2022
;; MSG SIZE  rcvd: 107
Host info
160.172.94.138.in-addr.arpa domain name pointer 160.172.94.138.clicknetmatupa.com.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
160.172.94.138.in-addr.arpa	name = 160.172.94.138.clicknetmatupa.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
128.199.204.26 attackspambots
Dec  8 05:49:33 legacy sshd[12481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.204.26
Dec  8 05:49:35 legacy sshd[12481]: Failed password for invalid user durandette from 128.199.204.26 port 50946 ssh2
Dec  8 05:57:37 legacy sshd[12851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.204.26
...
2019-12-08 13:00:10
103.122.90.150 attackbotsspam
Exploited host used to relais spam through hacked email accounts
2019-12-08 09:51:02
94.191.50.51 attackspam
2019-12-08T01:13:20.065269abusebot-6.cloudsearch.cf sshd\[20609\]: Invalid user kimone from 94.191.50.51 port 32896
2019-12-08 09:30:09
151.236.193.195 attack
Dec  8 00:29:31 [host] sshd[19456]: Invalid user cyrus from 151.236.193.195
Dec  8 00:29:31 [host] sshd[19456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.236.193.195
Dec  8 00:29:33 [host] sshd[19456]: Failed password for invalid user cyrus from 151.236.193.195 port 3245 ssh2
2019-12-08 09:41:23
58.18.250.82 attackbots
Unauthorised access (Dec  8) SRC=58.18.250.82 LEN=40 TTL=238 ID=2600 TCP DPT=1433 WINDOW=1024 SYN
2019-12-08 09:25:42
182.61.37.35 attack
Dec  8 02:28:54 root sshd[12600]: Failed password for root from 182.61.37.35 port 60553 ssh2
Dec  8 02:35:48 root sshd[12872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.37.35 
Dec  8 02:35:50 root sshd[12872]: Failed password for invalid user dbus from 182.61.37.35 port 35041 ssh2
...
2019-12-08 09:42:37
221.125.165.59 attackbots
Dec  8 02:11:04 OPSO sshd\[12566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.125.165.59  user=root
Dec  8 02:11:06 OPSO sshd\[12566\]: Failed password for root from 221.125.165.59 port 46492 ssh2
Dec  8 02:17:32 OPSO sshd\[15375\]: Invalid user meberg from 221.125.165.59 port 46818
Dec  8 02:17:32 OPSO sshd\[15375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.125.165.59
Dec  8 02:17:34 OPSO sshd\[15375\]: Failed password for invalid user meberg from 221.125.165.59 port 46818 ssh2
2019-12-08 09:27:18
49.75.5.210 attack
" "
2019-12-08 09:32:31
178.128.123.111 attack
Dec  7 15:14:04 tdfoods sshd\[24303\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.123.111  user=root
Dec  7 15:14:06 tdfoods sshd\[24303\]: Failed password for root from 178.128.123.111 port 54272 ssh2
Dec  7 15:20:17 tdfoods sshd\[24900\]: Invalid user anto from 178.128.123.111
Dec  7 15:20:17 tdfoods sshd\[24900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.123.111
Dec  7 15:20:19 tdfoods sshd\[24900\]: Failed password for invalid user anto from 178.128.123.111 port 35940 ssh2
2019-12-08 09:37:48
112.116.164.240 attackspambots
$f2bV_matches
2019-12-08 09:24:42
203.156.125.195 attackspambots
Dec  6 23:05:36 mail sshd[1845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.156.125.195 
Dec  6 23:05:38 mail sshd[1845]: Failed password for invalid user liwa from 203.156.125.195 port 35638 ssh2
Dec  6 23:12:34 mail sshd[3583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.156.125.195
2019-12-08 09:20:19
101.255.52.171 attackspambots
IP blocked
2019-12-08 09:19:35
178.62.27.245 attackspam
Dec  8 04:32:31 server sshd\[26435\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.27.245  user=root
Dec  8 04:32:34 server sshd\[26435\]: Failed password for root from 178.62.27.245 port 52881 ssh2
Dec  8 04:41:45 server sshd\[29052\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.27.245  user=root
Dec  8 04:41:46 server sshd\[29052\]: Failed password for root from 178.62.27.245 port 57512 ssh2
Dec  8 04:46:38 server sshd\[30409\]: Invalid user test from 178.62.27.245
Dec  8 04:46:38 server sshd\[30409\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.27.245 
...
2019-12-08 09:47:54
191.98.163.2 attack
Dec  8 00:23:12 markkoudstaal sshd[25795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.98.163.2
Dec  8 00:23:14 markkoudstaal sshd[25795]: Failed password for invalid user client from 191.98.163.2 port 48500 ssh2
Dec  8 00:29:32 markkoudstaal sshd[26637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.98.163.2
2019-12-08 09:45:21
104.238.129.240 attackspam
Dec  8 01:37:27 server sshd\[10717\]: Invalid user support from 104.238.129.240
Dec  8 01:37:27 server sshd\[10717\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.238.129.240 
Dec  8 01:37:29 server sshd\[10717\]: Failed password for invalid user support from 104.238.129.240 port 39476 ssh2
Dec  8 02:29:29 server sshd\[24420\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.238.129.240  user=root
Dec  8 02:29:31 server sshd\[24420\]: Failed password for root from 104.238.129.240 port 38986 ssh2
...
2019-12-08 09:44:34

Recently Reported IPs

138.94.172.168 138.94.172.196 138.94.172.166 138.94.172.187
138.94.172.174 138.94.172.177 118.190.154.157 138.94.172.198
138.94.172.209 138.94.172.236 138.94.172.239 138.94.172.201
138.94.172.96 138.94.172.251 138.94.172.246 138.94.172.92
138.94.172.226 118.190.155.125 138.94.173.10 138.94.173.1