Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
138.97.23.190 attack
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth):
2020-09-25 05:18:57
138.97.23.190 attackspam
2020-08-31 18:00:48,963 fail2ban.actions: WARNING [ssh] Ban 138.97.23.190
2020-09-01 01:42:36
138.97.23.190 attackspambots
Invalid user pan from 138.97.23.190 port 52316
2020-08-22 15:04:16
138.97.23.190 attackspambots
2020-08-20T01:27:55.070227hostname sshd[15309]: Failed password for invalid user ts from 138.97.23.190 port 39540 ssh2
...
2020-08-22 04:09:25
138.97.23.190 attackspam
2020-08-18T05:01:30.511619billing sshd[24790]: Invalid user ywq from 138.97.23.190 port 56240
2020-08-18T05:01:32.925134billing sshd[24790]: Failed password for invalid user ywq from 138.97.23.190 port 56240 ssh2
2020-08-18T05:08:55.039070billing sshd[8683]: Invalid user steam from 138.97.23.190 port 36908
...
2020-08-18 06:09:14
138.97.23.190 attackbotsspam
Jul 13 11:59:30 cp sshd[20647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.23.190
2020-07-13 19:53:40
138.97.23.190 attackspam
Invalid user system from 138.97.23.190 port 50614
2020-06-11 01:00:37
138.97.239.9 attack
2020-06-03T15:30:55.079307struts4.enskede.local sshd\[10571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.239.9  user=root
2020-06-03T15:30:57.984504struts4.enskede.local sshd\[10571\]: Failed password for root from 138.97.239.9 port 57648 ssh2
2020-06-03T15:35:20.566661struts4.enskede.local sshd\[10606\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.239.9  user=root
2020-06-03T15:35:23.537446struts4.enskede.local sshd\[10606\]: Failed password for root from 138.97.239.9 port 60017 ssh2
2020-06-03T15:39:47.811111struts4.enskede.local sshd\[10617\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.239.9  user=root
...
2020-06-04 02:00:06
138.97.23.190 attackspambots
May 30 10:50:36 server sshd[10446]: Failed password for root from 138.97.23.190 port 33214 ssh2
May 30 10:55:10 server sshd[10749]: Failed password for root from 138.97.23.190 port 39008 ssh2
...
2020-05-30 17:14:40
138.97.239.9 attackbots
May 29 07:02:35 OPSO sshd\[5528\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.239.9  user=root
May 29 07:02:37 OPSO sshd\[5528\]: Failed password for root from 138.97.239.9 port 43243 ssh2
May 29 07:07:14 OPSO sshd\[6477\]: Invalid user ff from 138.97.239.9 port 45946
May 29 07:07:14 OPSO sshd\[6477\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.239.9
May 29 07:07:16 OPSO sshd\[6477\]: Failed password for invalid user ff from 138.97.239.9 port 45946 ssh2
2020-05-29 16:49:56
138.97.23.190 attackspambots
2020-05-25T04:32:51.2667751495-001 sshd[20947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=dynamic-138-97-23-190.camontelecom.net.br  user=root
2020-05-25T04:32:53.1019671495-001 sshd[20947]: Failed password for root from 138.97.23.190 port 58700 ssh2
2020-05-25T04:35:49.5880561495-001 sshd[21095]: Invalid user sole from 138.97.23.190 port 41348
2020-05-25T04:35:49.5958391495-001 sshd[21095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=dynamic-138-97-23-190.camontelecom.net.br
2020-05-25T04:35:49.5880561495-001 sshd[21095]: Invalid user sole from 138.97.23.190 port 41348
2020-05-25T04:35:51.8678151495-001 sshd[21095]: Failed password for invalid user sole from 138.97.23.190 port 41348 ssh2
...
2020-05-25 18:12:06
138.97.23.190 attackspambots
(sshd) Failed SSH login from 138.97.23.190 (BR/Brazil/dynamic-138-97-23-190.camontelecom.net.br): 5 in the last 3600 secs
2020-05-14 03:18:53
138.97.23.190 attackbots
fail2ban -- 138.97.23.190
...
2020-05-02 21:43:57
138.97.23.190 attackspambots
Apr 30 13:10:08 game-panel sshd[21797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.23.190
Apr 30 13:10:10 game-panel sshd[21797]: Failed password for invalid user wy from 138.97.23.190 port 44162 ssh2
Apr 30 13:15:19 game-panel sshd[21971]: Failed password for root from 138.97.23.190 port 57002 ssh2
2020-04-30 21:18:49
138.97.23.190 attackbotsspam
2020-04-29T13:59:19.810118vps773228.ovh.net sshd[24609]: Failed password for invalid user molisoft from 138.97.23.190 port 40564 ssh2
2020-04-29T14:04:07.317604vps773228.ovh.net sshd[24683]: Invalid user poss from 138.97.23.190 port 51610
2020-04-29T14:04:07.329626vps773228.ovh.net sshd[24683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=dynamic-138-97-23-190.camontelecom.net.br
2020-04-29T14:04:07.317604vps773228.ovh.net sshd[24683]: Invalid user poss from 138.97.23.190 port 51610
2020-04-29T14:04:08.774493vps773228.ovh.net sshd[24683]: Failed password for invalid user poss from 138.97.23.190 port 51610 ssh2
...
2020-04-29 20:19:40
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.97.23.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20732
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.97.23.214.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 07:59:09 CST 2022
;; MSG SIZE  rcvd: 106
Host info
214.23.97.138.in-addr.arpa domain name pointer dynamic-138-97-23-214.camontelecom.net.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
214.23.97.138.in-addr.arpa	name = dynamic-138-97-23-214.camontelecom.net.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
42.116.55.37 attackspambots
Unauthorized connection attempt detected from IP address 42.116.55.37 to port 23 [T]
2020-03-24 18:36:09
46.180.252.110 attack
Unauthorized connection attempt detected from IP address 46.180.252.110 to port 23 [T]
2020-03-24 18:33:24
180.100.74.4 attackbotsspam
Unauthorized connection attempt detected from IP address 180.100.74.4 to port 3389 [T]
2020-03-24 18:50:16
223.207.230.78 attackspambots
Unauthorized connection attempt detected from IP address 223.207.230.78 to port 445 [T]
2020-03-24 18:40:01
121.61.104.218 attackbots
Unauthorized connection attempt detected from IP address 121.61.104.218 to port 23 [T]
2020-03-24 18:54:31
153.101.65.73 attackbots
Unauthorized connection attempt detected from IP address 153.101.65.73 to port 1433 [T]
2020-03-24 18:18:46
121.61.97.101 attackspam
Unauthorized connection attempt detected from IP address 121.61.97.101 to port 23 [T]
2020-03-24 18:55:26
134.209.252.17 attack
Unauthorized connection attempt detected from IP address 134.209.252.17 to port 322 [T]
2020-03-24 18:51:49
118.193.31.180 attackspambots
Unauthorized connection attempt detected from IP address 118.193.31.180 to port 515 [T]
2020-03-24 18:57:38
101.200.210.27 attackbots
Unauthorized connection attempt detected from IP address 101.200.210.27 to port 8545 [T]
2020-03-24 18:29:36
123.11.3.222 attack
Unauthorized connection attempt detected from IP address 123.11.3.222 to port 80 [T]
2020-03-24 18:21:47
123.195.115.137 attackspambots
Unauthorized connection attempt detected from IP address 123.195.115.137 to port 23 [T]
2020-03-24 18:20:07
116.44.137.24 attackspam
Unauthorized connection attempt detected from IP address 116.44.137.24 to port 23 [T]
2020-03-24 18:59:24
113.25.164.196 attack
Unauthorized connection attempt detected from IP address 113.25.164.196 to port 23 [T]
2020-03-24 19:01:02
125.71.239.135 attackspam
Unauthorized connection attempt detected from IP address 125.71.239.135 to port 1433 [T]
2020-03-24 18:52:22

Recently Reported IPs

138.97.227.202 138.97.233.104 138.97.233.101 118.190.79.149
138.97.233.106 138.97.233.11 138.97.233.112 138.97.233.114
138.97.233.121 138.97.233.126 138.97.233.137 138.97.233.140
138.97.233.142 138.97.233.130 118.190.79.36 138.97.233.154
118.190.82.43 118.190.83.73 118.194.242.185 118.194.242.186