Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.94.38.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36519
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.94.38.248.			IN	A

;; AUTHORITY SECTION:
.			556	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 17:33:44 CST 2022
;; MSG SIZE  rcvd: 106
Host info
b'248.38.94.138.in-addr.arpa domain name pointer 248.amazonett.com.br.
'
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
248.38.94.138.in-addr.arpa	name = 248.amazonet.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.248.175.156 attackspambots
sshd jail - ssh hack attempt
2020-08-13 22:49:09
201.138.130.204 attack
Automatic report - Port Scan Attack
2020-08-13 22:23:22
112.0.112.57 attack
Brute force attempt
2020-08-13 22:22:09
106.12.194.204 attackbotsspam
Aug 13 15:32:32 OPSO sshd\[19892\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.194.204  user=root
Aug 13 15:32:35 OPSO sshd\[19892\]: Failed password for root from 106.12.194.204 port 38452 ssh2
Aug 13 15:35:57 OPSO sshd\[20389\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.194.204  user=root
Aug 13 15:35:59 OPSO sshd\[20389\]: Failed password for root from 106.12.194.204 port 45860 ssh2
Aug 13 15:39:10 OPSO sshd\[20703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.194.204  user=root
2020-08-13 23:01:58
211.27.28.214 attackspambots
php WP PHPmyadamin ABUSE blocked for 12h
2020-08-13 22:19:18
2001:41d0:a:446f:: attack
2001:41d0:a:446f:: - - [13/Aug/2020:14:12:27 +0100] "POST /wp-login.php HTTP/1.1" 200 2401 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2001:41d0:a:446f:: - - [13/Aug/2020:14:12:27 +0100] "POST /wp-login.php HTTP/1.1" 200 2415 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2001:41d0:a:446f:: - - [13/Aug/2020:14:12:27 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-13 22:53:59
150.129.8.85 attackspam
xmlrpc attack
2020-08-13 23:01:01
23.129.64.189 attackspambots
Aug 13 14:56:53 lnxweb61 sshd[14077]: Failed password for root from 23.129.64.189 port 14940 ssh2
Aug 13 14:56:56 lnxweb61 sshd[14077]: Failed password for root from 23.129.64.189 port 14940 ssh2
Aug 13 14:56:58 lnxweb61 sshd[14077]: Failed password for root from 23.129.64.189 port 14940 ssh2
Aug 13 14:57:01 lnxweb61 sshd[14077]: Failed password for root from 23.129.64.189 port 14940 ssh2
2020-08-13 22:24:49
77.235.144.2 attackbotsspam
Telnet Honeypot -> Telnet Bruteforce / Login
2020-08-13 22:18:40
154.0.161.99 attackbots
fail2ban
2020-08-13 22:56:58
58.33.35.82 attackspambots
web-1 [ssh] SSH Attack
2020-08-13 22:16:30
89.163.247.77 attackspambots
Chat Spam
2020-08-13 22:32:39
222.186.175.23 attack
2020-08-13T09:23:58.080804morrigan.ad5gb.com sshd[2496058]: Failed password for root from 222.186.175.23 port 41976 ssh2
2020-08-13T09:24:01.971802morrigan.ad5gb.com sshd[2496058]: Failed password for root from 222.186.175.23 port 41976 ssh2
2020-08-13 22:26:58
199.249.230.104 attackspambots
xmlrpc attack
2020-08-13 22:34:34
93.158.66.43 attackbotsspam
(mod_security) mod_security (id:949110) triggered by 93.158.66.43 (SE/Sweden/web.fruitkings.com): 5 in the last 14400 secs; ID: rub
2020-08-13 22:43:30

Recently Reported IPs

138.97.105.199 138.97.183.246 138.94.73.68 138.97.177.42
138.97.31.29 138.97.180.4 138.97.31.50 138.97.28.205
138.97.28.222 138.97.31.28 138.97.31.53 138.97.95.75
138.97.31.105 138.97.48.163 138.99.152.120 138.97.31.61
138.99.117.225 138.99.167.71 138.99.161.156 138.97.31.56