Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
138.97.224.88 attack
Automatic report - Port Scan Attack
2020-10-01 08:47:47
138.97.224.88 attackspam
Automatic report - Port Scan Attack
2020-10-01 01:23:20
138.97.224.88 attackbotsspam
Automatic report - Port Scan Attack
2020-09-30 17:35:18
138.97.22.186 attackspambots
SSH/22 MH Probe, BF, Hack -
2020-09-30 02:59:46
138.97.22.186 attack
SSH/22 MH Probe, BF, Hack -
2020-09-29 19:02:11
138.97.241.37 attackbots
Sep 26 16:13:02 server sshd[18441]: Failed password for invalid user openvpn from 138.97.241.37 port 42432 ssh2
Sep 26 16:16:43 server sshd[19383]: Failed password for invalid user dmdba from 138.97.241.37 port 34428 ssh2
Sep 26 16:20:29 server sshd[20264]: Failed password for invalid user transfer from 138.97.241.37 port 54654 ssh2
2020-09-27 00:49:16
138.97.241.37 attackbots
21125/tcp 9563/tcp 15319/tcp...
[2020-08-31/09-26]19pkt,18pt.(tcp)
2020-09-26 16:40:09
138.97.23.190 attack
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth):
2020-09-25 05:18:57
138.97.241.37 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-13 21:56:34
138.97.241.37 attackspam
Sep 13 07:25:21 abendstille sshd\[21590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.241.37  user=root
Sep 13 07:25:23 abendstille sshd\[21590\]: Failed password for root from 138.97.241.37 port 33160 ssh2
Sep 13 07:29:54 abendstille sshd\[25756\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.241.37  user=root
Sep 13 07:29:56 abendstille sshd\[25756\]: Failed password for root from 138.97.241.37 port 41632 ssh2
Sep 13 07:34:29 abendstille sshd\[30104\]: Invalid user it from 138.97.241.37
Sep 13 07:34:29 abendstille sshd\[30104\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.241.37
...
2020-09-13 13:51:43
138.97.241.37 attackbots
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-13 05:35:24
138.97.212.245 attackbots
IP 138.97.212.245 attacked honeypot on port: 1433 at 9/9/2020 9:46:48 AM
2020-09-11 03:23:00
138.97.212.245 attackspambots
IP 138.97.212.245 attacked honeypot on port: 1433 at 9/9/2020 9:46:48 AM
2020-09-10 18:52:45
138.97.241.37 attackbotsspam
Sep  8 02:23:41 web9 sshd\[17871\]: Invalid user raudel from 138.97.241.37
Sep  8 02:23:41 web9 sshd\[17871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.241.37
Sep  8 02:23:42 web9 sshd\[17871\]: Failed password for invalid user raudel from 138.97.241.37 port 34302 ssh2
Sep  8 02:27:31 web9 sshd\[18342\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.241.37  user=root
Sep  8 02:27:33 web9 sshd\[18342\]: Failed password for root from 138.97.241.37 port 60396 ssh2
2020-09-08 21:19:02
138.97.241.37 attackspam
Sep  8 04:42:19 ns382633 sshd\[23233\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.241.37  user=root
Sep  8 04:42:21 ns382633 sshd\[23233\]: Failed password for root from 138.97.241.37 port 47262 ssh2
Sep  8 04:47:18 ns382633 sshd\[24132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.241.37  user=root
Sep  8 04:47:20 ns382633 sshd\[24132\]: Failed password for root from 138.97.241.37 port 58364 ssh2
Sep  8 04:51:08 ns382633 sshd\[24920\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.241.37  user=root
2020-09-08 13:11:24
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.97.2.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63521
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.97.2.104.			IN	A

;; AUTHORITY SECTION:
.			289	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 07:57:52 CST 2022
;; MSG SIZE  rcvd: 105
Host info
104.2.97.138.in-addr.arpa domain name pointer 104-2-97-138.clickturbo.com.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
104.2.97.138.in-addr.arpa	name = 104-2-97-138.clickturbo.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
92.50.249.92 attackbots
Jun 26 14:06:12 vm0 sshd[10727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.50.249.92
Jun 26 14:06:13 vm0 sshd[10727]: Failed password for invalid user fauzi from 92.50.249.92 port 54494 ssh2
...
2020-06-26 22:37:51
124.205.224.179 attackbotsspam
Jun 26 15:04:30 serwer sshd\[20479\]: Invalid user Test from 124.205.224.179 port 45378
Jun 26 15:04:30 serwer sshd\[20479\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.205.224.179
Jun 26 15:04:32 serwer sshd\[20479\]: Failed password for invalid user Test from 124.205.224.179 port 45378 ssh2
...
2020-06-26 22:39:31
112.6.44.28 attack
Brute force attempt
2020-06-26 22:54:24
179.93.149.17 attackbots
Jun 26 14:30:32 server sshd[28861]: Failed password for invalid user zh from 179.93.149.17 port 41203 ssh2
Jun 26 14:35:49 server sshd[1868]: Failed password for invalid user upload from 179.93.149.17 port 41268 ssh2
Jun 26 14:41:07 server sshd[7790]: Failed password for invalid user summit from 179.93.149.17 port 41335 ssh2
2020-06-26 23:17:58
106.54.32.196 attackspam
Jun 26 17:39:42 hosting sshd[9512]: Invalid user kerry from 106.54.32.196 port 40142
Jun 26 17:39:42 hosting sshd[9512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.32.196
Jun 26 17:39:42 hosting sshd[9512]: Invalid user kerry from 106.54.32.196 port 40142
Jun 26 17:39:44 hosting sshd[9512]: Failed password for invalid user kerry from 106.54.32.196 port 40142 ssh2
Jun 26 17:49:29 hosting sshd[10681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.32.196  user=postgres
Jun 26 17:49:30 hosting sshd[10681]: Failed password for postgres from 106.54.32.196 port 40900 ssh2
...
2020-06-26 23:24:20
125.160.196.89 attackbotsspam
 TCP (SYN) 125.160.196.89:25976 -> port 23, len 44
2020-06-26 23:12:24
172.245.185.212 attackbotsspam
Jun 26 05:10:22 dignus sshd[9937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.245.185.212
Jun 26 05:10:24 dignus sshd[9937]: Failed password for invalid user git from 172.245.185.212 port 44886 ssh2
Jun 26 05:15:13 dignus sshd[10397]: Invalid user test from 172.245.185.212 port 44042
Jun 26 05:15:13 dignus sshd[10397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.245.185.212
Jun 26 05:15:15 dignus sshd[10397]: Failed password for invalid user test from 172.245.185.212 port 44042 ssh2
...
2020-06-26 22:57:03
222.186.30.35 attackspam
Jun 26 16:45:11 Ubuntu-1404-trusty-64-minimal sshd\[8518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.35  user=root
Jun 26 16:45:13 Ubuntu-1404-trusty-64-minimal sshd\[8518\]: Failed password for root from 222.186.30.35 port 17437 ssh2
Jun 26 16:45:20 Ubuntu-1404-trusty-64-minimal sshd\[8555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.35  user=root
Jun 26 16:45:22 Ubuntu-1404-trusty-64-minimal sshd\[8555\]: Failed password for root from 222.186.30.35 port 51814 ssh2
Jun 26 16:45:31 Ubuntu-1404-trusty-64-minimal sshd\[8607\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.35  user=root
2020-06-26 22:51:04
200.194.28.25 attack
Automatic report - Port Scan Attack
2020-06-26 23:20:18
197.51.239.102 attack
Jun 26 14:35:35 pornomens sshd\[11414\]: Invalid user nagios from 197.51.239.102 port 46196
Jun 26 14:35:35 pornomens sshd\[11414\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.51.239.102
Jun 26 14:35:37 pornomens sshd\[11414\]: Failed password for invalid user nagios from 197.51.239.102 port 46196 ssh2
...
2020-06-26 22:58:30
103.141.165.35 attack
Jun 26 11:20:52 ip-172-31-61-156 sshd[10203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.141.165.35
Jun 26 11:20:52 ip-172-31-61-156 sshd[10203]: Invalid user oracle from 103.141.165.35
Jun 26 11:20:55 ip-172-31-61-156 sshd[10203]: Failed password for invalid user oracle from 103.141.165.35 port 41458 ssh2
Jun 26 11:27:12 ip-172-31-61-156 sshd[10466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.141.165.35  user=root
Jun 26 11:27:14 ip-172-31-61-156 sshd[10466]: Failed password for root from 103.141.165.35 port 58642 ssh2
...
2020-06-26 23:14:00
168.194.13.25 attack
Jun 26 03:04:59 php1 sshd\[2464\]: Invalid user bitnami from 168.194.13.25
Jun 26 03:04:59 php1 sshd\[2464\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.194.13.25
Jun 26 03:05:01 php1 sshd\[2464\]: Failed password for invalid user bitnami from 168.194.13.25 port 43756 ssh2
Jun 26 03:08:47 php1 sshd\[2809\]: Invalid user hw from 168.194.13.25
Jun 26 03:08:47 php1 sshd\[2809\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.194.13.25
2020-06-26 22:59:53
13.72.249.53 attackspam
Jun 26 16:14:55 sso sshd[5348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.72.249.53
Jun 26 16:14:57 sso sshd[5348]: Failed password for invalid user user from 13.72.249.53 port 62319 ssh2
...
2020-06-26 22:42:04
219.77.79.82 attackspambots
Port probing on unauthorized port 5555
2020-06-26 22:45:44
54.38.36.210 attackspambots
Jun 26 08:49:27 Tower sshd[7764]: Connection from 54.38.36.210 port 32858 on 192.168.10.220 port 22 rdomain ""
Jun 26 08:49:29 Tower sshd[7764]: Invalid user julia from 54.38.36.210 port 32858
Jun 26 08:49:29 Tower sshd[7764]: error: Could not get shadow information for NOUSER
Jun 26 08:49:29 Tower sshd[7764]: Failed password for invalid user julia from 54.38.36.210 port 32858 ssh2
Jun 26 08:49:29 Tower sshd[7764]: Received disconnect from 54.38.36.210 port 32858:11: Bye Bye [preauth]
Jun 26 08:49:29 Tower sshd[7764]: Disconnected from invalid user julia 54.38.36.210 port 32858 [preauth]
2020-06-26 23:06:12

Recently Reported IPs

138.97.2.10 138.97.2.102 118.190.24.141 138.97.2.118
138.97.2.110 138.97.2.114 138.97.2.123 138.97.2.125
138.97.2.12 138.97.2.121 138.97.2.126 118.190.24.37
138.97.2.132 138.97.2.128 138.97.2.136 138.97.2.14
138.97.2.138 138.97.2.135 138.97.2.150 138.97.2.145