Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.97.148.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55039
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.97.148.6.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 15:06:42 CST 2022
;; MSG SIZE  rcvd: 105
Host info
6.148.97.138.in-addr.arpa domain name pointer 138-97-148-6.netmania.tec.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
6.148.97.138.in-addr.arpa	name = 138-97-148-6.netmania.tec.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
134.209.164.184 attackspam
Unauthorized connection attempt detected from IP address 134.209.164.184 to port 7446
2020-05-26 10:50:22
45.142.195.7 attack
May 26 04:29:10 relay postfix/smtpd\[21598\]: warning: unknown\[45.142.195.7\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 26 04:29:45 relay postfix/smtpd\[8395\]: warning: unknown\[45.142.195.7\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 26 04:30:04 relay postfix/smtpd\[21598\]: warning: unknown\[45.142.195.7\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 26 04:30:37 relay postfix/smtpd\[24920\]: warning: unknown\[45.142.195.7\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 26 04:30:54 relay postfix/smtpd\[2890\]: warning: unknown\[45.142.195.7\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-05-26 10:34:58
174.138.64.163 attackspam
May 26 03:20:10 sip sshd[409836]: Failed password for root from 174.138.64.163 port 37172 ssh2
May 26 03:23:58 sip sshd[409864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.64.163  user=root
May 26 03:24:01 sip sshd[409864]: Failed password for root from 174.138.64.163 port 42720 ssh2
...
2020-05-26 10:16:07
222.186.175.183 attack
May 26 02:10:14 sshgateway sshd\[20974\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.183  user=root
May 26 02:10:16 sshgateway sshd\[20974\]: Failed password for root from 222.186.175.183 port 7678 ssh2
May 26 02:10:31 sshgateway sshd\[20974\]: error: maximum authentication attempts exceeded for root from 222.186.175.183 port 7678 ssh2 \[preauth\]
2020-05-26 10:17:53
52.35.230.233 attackspam
Bad bot/spoofed identity
2020-05-26 10:36:05
112.85.42.174 attack
May 26 04:31:32 eventyay sshd[20468]: Failed password for root from 112.85.42.174 port 9695 ssh2
May 26 04:31:46 eventyay sshd[20468]: error: maximum authentication attempts exceeded for root from 112.85.42.174 port 9695 ssh2 [preauth]
May 26 04:31:52 eventyay sshd[20478]: Failed password for root from 112.85.42.174 port 36904 ssh2
...
2020-05-26 10:33:52
36.90.223.231 attackbotsspam
May 22 14:18:41 localhost sshd[43245]: Invalid user pzr from 36.90.223.231 port 38282
May 22 14:18:41 localhost sshd[43245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.90.223.231 
May 22 14:18:41 localhost sshd[43245]: Invalid user pzr from 36.90.223.231 port 38282
May 22 14:18:43 localhost sshd[43245]: Failed password for invalid user pzr from 36.90.223.231 port 38282 ssh2
May 22 14:28:59 localhost sshd[50342]: Invalid user we from 36.90.223.231 port 59104
May 22 14:28:59 localhost sshd[50342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.90.223.231 
May 22 14:28:59 localhost sshd[50342]: Invalid user we from 36.90.223.231 port 59104
May 22 14:29:00 localhost sshd[50342]: Failed password for invalid user we from 36.90.223.231 port 59104 ssh2
May 22 14:32:24 localhost sshd[52950]: Invalid user xhe from 36.90.223.231 port 44762


........
-----------------------------------------------
https://www.blocklist.de/en/view
2020-05-26 10:38:05
157.245.34.72 attackspam
pixelfritteuse.de 157.245.34.72 [26/May/2020:01:25:58 +0200] "POST /wp-login.php HTTP/1.1" 200 5983 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
pixelfritteuse.de 157.245.34.72 [26/May/2020:01:25:58 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4087 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-26 10:20:56
218.78.10.183 attackspambots
May 25 23:20:20 onepixel sshd[1510187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.10.183  user=root
May 25 23:20:21 onepixel sshd[1510187]: Failed password for root from 218.78.10.183 port 40786 ssh2
May 25 23:23:09 onepixel sshd[1510530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.10.183  user=root
May 25 23:23:11 onepixel sshd[1510530]: Failed password for root from 218.78.10.183 port 38252 ssh2
May 25 23:26:02 onepixel sshd[1510862]: Invalid user ishinkyo from 218.78.10.183 port 35722
2020-05-26 10:18:46
109.232.109.58 attackbotsspam
SSH Brute-Force attacks
2020-05-26 10:21:46
114.32.91.181 attack
Port probing on unauthorized port 23
2020-05-26 10:28:17
187.102.55.4 attack
Automatic report - Port Scan Attack
2020-05-26 10:51:45
81.237.103.91 attackspambots
May 26 01:17:53 liveconfig01 sshd[32726]: Invalid user pi from 81.237.103.91
May 26 01:17:53 liveconfig01 sshd[32726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.237.103.91
May 26 01:17:53 liveconfig01 sshd[32728]: Invalid user pi from 81.237.103.91
May 26 01:17:53 liveconfig01 sshd[32728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.237.103.91
May 26 01:17:56 liveconfig01 sshd[32726]: Failed password for invalid user pi from 81.237.103.91 port 36964 ssh2
May 26 01:17:56 liveconfig01 sshd[32726]: Connection closed by 81.237.103.91 port 36964 [preauth]
May 26 01:17:56 liveconfig01 sshd[32728]: Failed password for invalid user pi from 81.237.103.91 port 36966 ssh2
May 26 01:17:56 liveconfig01 sshd[32728]: Connection closed by 81.237.103.91 port 36966 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=81.237.103.91
2020-05-26 10:22:20
111.248.144.194 attackspambots
Port probing on unauthorized port 23
2020-05-26 10:18:32
62.171.152.36 attackspambots
[portscan] Port scan
2020-05-26 10:42:50

Recently Reported IPs

154.66.153.133 117.111.28.13 61.52.197.76 46.60.8.61
2.189.32.236 170.254.73.202 46.99.189.233 201.221.133.122
113.22.86.239 185.49.169.152 187.177.99.253 197.49.17.111
43.228.37.34 220.132.82.123 182.92.103.37 23.108.4.92
182.142.125.111 117.211.145.34 79.125.187.126 187.178.227.159