Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: Rondonia

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: Wn Serviços De Informatica Ltda-me

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
138.97.147.3 attackbots
Unauthorized connection attempt detected from IP address 138.97.147.3 to port 8080
2020-03-02 04:03:32
138.97.147.4 attackbots
Unauthorized connection attempt detected from IP address 138.97.147.4 to port 80 [J]
2020-01-24 23:40:23
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.97.147.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51551
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.97.147.6.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052300 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri May 24 00:52:21 CST 2019
;; MSG SIZE  rcvd: 116

Host info
Host 6.147.97.138.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 67.207.67.2, trying next server
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 6.147.97.138.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
59.127.251.232 attackspambots
unauthorized connection attempt
2020-02-19 19:56:37
46.72.157.209 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-02-19 19:41:15
211.75.173.58 attack
Portscan detected
2020-02-19 20:00:43
103.37.201.171 attackspam
unauthorized connection attempt
2020-02-19 19:52:07
171.242.69.14 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-02-19 20:08:48
14.248.159.181 attackbotsspam
unauthorized connection attempt
2020-02-19 20:07:06
211.107.100.96 attackbots
[portscan] tcp/23 [TELNET]
*(RWIN=4421)(02191212)
2020-02-19 20:11:29
220.132.186.144 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-02-19 20:10:33
103.209.143.60 attackbotsspam
unauthorized connection attempt
2020-02-19 19:51:38
177.66.255.224 attack
unauthorized connection attempt
2020-02-19 20:02:39
177.93.65.53 attackbotsspam
unauthorized connection attempt
2020-02-19 20:01:57
175.197.144.188 attackbots
unauthorized connection attempt
2020-02-19 19:48:03
121.254.120.14 attackbots
unauthorized connection attempt
2020-02-19 19:35:12
91.202.16.63 attackspam
unauthorized connection attempt
2020-02-19 19:53:39
2.89.239.115 attackbotsspam
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-19 19:42:41

Recently Reported IPs

97.50.125.146 79.122.43.252 182.117.48.254 180.222.130.56
218.7.206.234 219.133.12.253 138.117.121.17 1.134.172.239
154.51.222.44 192.227.120.170 123.4.119.128 134.212.142.138
218.80.83.183 208.254.121.38 102.114.39.165 58.211.196.226
68.89.130.243 158.71.127.197 185.209.0.59 173.32.96.162