Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
138.97.224.88 attack
Automatic report - Port Scan Attack
2020-10-01 08:47:47
138.97.224.88 attackspam
Automatic report - Port Scan Attack
2020-10-01 01:23:20
138.97.224.88 attackbotsspam
Automatic report - Port Scan Attack
2020-09-30 17:35:18
138.97.22.186 attackspambots
SSH/22 MH Probe, BF, Hack -
2020-09-30 02:59:46
138.97.22.186 attack
SSH/22 MH Probe, BF, Hack -
2020-09-29 19:02:11
138.97.241.37 attackbots
Sep 26 16:13:02 server sshd[18441]: Failed password for invalid user openvpn from 138.97.241.37 port 42432 ssh2
Sep 26 16:16:43 server sshd[19383]: Failed password for invalid user dmdba from 138.97.241.37 port 34428 ssh2
Sep 26 16:20:29 server sshd[20264]: Failed password for invalid user transfer from 138.97.241.37 port 54654 ssh2
2020-09-27 00:49:16
138.97.241.37 attackbots
21125/tcp 9563/tcp 15319/tcp...
[2020-08-31/09-26]19pkt,18pt.(tcp)
2020-09-26 16:40:09
138.97.23.190 attack
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth):
2020-09-25 05:18:57
138.97.241.37 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-13 21:56:34
138.97.241.37 attackspam
Sep 13 07:25:21 abendstille sshd\[21590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.241.37  user=root
Sep 13 07:25:23 abendstille sshd\[21590\]: Failed password for root from 138.97.241.37 port 33160 ssh2
Sep 13 07:29:54 abendstille sshd\[25756\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.241.37  user=root
Sep 13 07:29:56 abendstille sshd\[25756\]: Failed password for root from 138.97.241.37 port 41632 ssh2
Sep 13 07:34:29 abendstille sshd\[30104\]: Invalid user it from 138.97.241.37
Sep 13 07:34:29 abendstille sshd\[30104\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.241.37
...
2020-09-13 13:51:43
138.97.241.37 attackbots
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-13 05:35:24
138.97.212.245 attackbots
IP 138.97.212.245 attacked honeypot on port: 1433 at 9/9/2020 9:46:48 AM
2020-09-11 03:23:00
138.97.212.245 attackspambots
IP 138.97.212.245 attacked honeypot on port: 1433 at 9/9/2020 9:46:48 AM
2020-09-10 18:52:45
138.97.241.37 attackbotsspam
Sep  8 02:23:41 web9 sshd\[17871\]: Invalid user raudel from 138.97.241.37
Sep  8 02:23:41 web9 sshd\[17871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.241.37
Sep  8 02:23:42 web9 sshd\[17871\]: Failed password for invalid user raudel from 138.97.241.37 port 34302 ssh2
Sep  8 02:27:31 web9 sshd\[18342\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.241.37  user=root
Sep  8 02:27:33 web9 sshd\[18342\]: Failed password for root from 138.97.241.37 port 60396 ssh2
2020-09-08 21:19:02
138.97.241.37 attackspam
Sep  8 04:42:19 ns382633 sshd\[23233\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.241.37  user=root
Sep  8 04:42:21 ns382633 sshd\[23233\]: Failed password for root from 138.97.241.37 port 47262 ssh2
Sep  8 04:47:18 ns382633 sshd\[24132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.241.37  user=root
Sep  8 04:47:20 ns382633 sshd\[24132\]: Failed password for root from 138.97.241.37 port 58364 ssh2
Sep  8 04:51:08 ns382633 sshd\[24920\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.241.37  user=root
2020-09-08 13:11:24
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.97.2.0
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36824
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.97.2.0.			IN	A

;; AUTHORITY SECTION:
.			298	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 07:57:48 CST 2022
;; MSG SIZE  rcvd: 103
Host info
Host 0.2.97.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 0.2.97.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
102.184.162.228 attack
Sun, 21 Jul 2019 18:27:32 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 07:35:57
180.241.212.173 attack
Sun, 21 Jul 2019 18:27:48 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 06:53:16
190.188.30.212 attack
Autoban   190.188.30.212 AUTH/CONNECT
2019-07-22 07:09:07
190.151.99.218 attackbotsspam
Autoban   190.151.99.218 AUTH/CONNECT
2019-07-22 07:31:23
190.194.16.121 attackspambots
Autoban   190.194.16.121 AUTH/CONNECT
2019-07-22 06:54:46
103.206.115.177 attackbotsspam
Sun, 21 Jul 2019 18:27:46 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 06:58:54
190.192.154.166 attack
Autoban   190.192.154.166 AUTH/CONNECT
2019-07-22 06:57:21
110.138.149.194 attackbots
Sun, 21 Jul 2019 18:27:39 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 07:18:09
185.49.98.5 attackbots
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-22 07:31:45
1.10.141.128 attackspam
Sun, 21 Jul 2019 18:27:36 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 07:27:04
190.192.56.211 attackbots
Autoban   190.192.56.211 AUTH/CONNECT
2019-07-22 06:57:49
190.156.190.39 attack
Autoban   190.156.190.39 AUTH/CONNECT
2019-07-22 07:31:05
82.102.16.196 attackbotsspam
Sun, 21 Jul 2019 18:27:40 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 07:15:53
208.68.36.133 attack
2019-07-22T00:49:52.030149  sshd[15629]: Invalid user gast from 208.68.36.133 port 42868
2019-07-22T00:49:52.045050  sshd[15629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.68.36.133
2019-07-22T00:49:52.030149  sshd[15629]: Invalid user gast from 208.68.36.133 port 42868
2019-07-22T00:49:54.259436  sshd[15629]: Failed password for invalid user gast from 208.68.36.133 port 42868 ssh2
2019-07-22T00:54:12.692038  sshd[15692]: Invalid user patrick from 208.68.36.133 port 39660
...
2019-07-22 07:19:05
112.205.176.11 attack
Sun, 21 Jul 2019 18:27:46 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 06:58:27

Recently Reported IPs

138.97.194.51 138.97.192.82 138.97.195.138 138.97.192.242
138.97.19.201 118.190.23.229 138.97.2.101 138.97.2.112
138.97.2.10 138.97.2.104 138.97.2.102 118.190.24.141
138.97.2.118 138.97.2.110 138.97.2.114 138.97.2.123
138.97.2.125 138.97.2.12 138.97.2.121 138.97.2.126