Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.97.34.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26105
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.97.34.34.			IN	A

;; AUTHORITY SECTION:
.			342	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 49 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:00:49 CST 2022
;; MSG SIZE  rcvd: 105
Host info
b';; connection timed out; no servers could be reached
'
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
34.34.97.138.in-addr.arpa	name = customer-138-97-34-34.maisinternet.net.br.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
139.59.226.82 attackspam
May 14 11:15:22 server sshd\[189989\]: Invalid user vbox from 139.59.226.82
May 14 11:15:22 server sshd\[189989\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.226.82
May 14 11:15:24 server sshd\[189989\]: Failed password for invalid user vbox from 139.59.226.82 port 45298 ssh2
...
2019-07-12 07:16:24
139.59.10.174 attack
May  6 16:47:39 server sshd\[161662\]: Invalid user avis from 139.59.10.174
May  6 16:47:39 server sshd\[161662\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.10.174
May  6 16:47:41 server sshd\[161662\]: Failed password for invalid user avis from 139.59.10.174 port 14295 ssh2
...
2019-07-12 07:40:18
139.59.154.219 attackspambots
Apr 10 09:45:41 server sshd\[65960\]: Invalid user ubuntu from 139.59.154.219
Apr 10 09:45:41 server sshd\[65960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.154.219
Apr 10 09:45:44 server sshd\[65960\]: Failed password for invalid user ubuntu from 139.59.154.219 port 51480 ssh2
...
2019-07-12 07:28:47
109.110.52.77 attackbotsspam
Invalid user tear from 109.110.52.77 port 48822
2019-07-12 07:02:07
103.38.89.57 attackspam
Unauthorized connection attempt from IP address 103.38.89.57 on Port 445(SMB)
2019-07-12 07:29:12
139.59.149.183 attack
Jul  9 06:01:23 server sshd\[159473\]: Invalid user web2 from 139.59.149.183
Jul  9 06:01:23 server sshd\[159473\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.149.183
Jul  9 06:01:25 server sshd\[159473\]: Failed password for invalid user web2 from 139.59.149.183 port 40006 ssh2
...
2019-07-12 07:31:05
23.101.67.47 attackspam
Unauthorized connection attempt from IP address 23.101.67.47 on Port 445(SMB)
2019-07-12 07:26:03
42.123.72.50 attackspambots
Unauthorized connection attempt from IP address 42.123.72.50 on Port 445(SMB)
2019-07-12 07:02:42
77.247.181.162 attack
[AUTOMATIC REPORT] - 24 tries in total - SSH BRUTE FORCE - IP banned
2019-07-12 07:13:17
139.59.38.252 attackspambots
2019-07-11T16:09:14.025698WS-Zach sshd[22862]: Invalid user daniel from 139.59.38.252 port 51878
2019-07-11T16:09:14.029386WS-Zach sshd[22862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.38.252
2019-07-11T16:09:14.025698WS-Zach sshd[22862]: Invalid user daniel from 139.59.38.252 port 51878
2019-07-11T16:09:16.295131WS-Zach sshd[22862]: Failed password for invalid user daniel from 139.59.38.252 port 51878 ssh2
2019-07-11T16:24:50.917540WS-Zach sshd[30979]: Invalid user hp from 139.59.38.252 port 47874
...
2019-07-12 07:06:33
36.84.64.80 attackbots
Unauthorized connection attempt from IP address 36.84.64.80 on Port 445(SMB)
2019-07-12 07:25:39
192.198.87.174 attack
445/tcp 445/tcp 445/tcp...
[2019-06-13/07-11]5pkt,1pt.(tcp)
2019-07-12 07:12:41
139.59.41.154 attackbots
Jun 29 03:33:50 server sshd\[101070\]: Invalid user minecraft from 139.59.41.154
Jun 29 03:33:50 server sshd\[101070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.41.154
Jun 29 03:33:52 server sshd\[101070\]: Failed password for invalid user minecraft from 139.59.41.154 port 58692 ssh2
...
2019-07-12 07:06:17
139.59.213.237 attack
Jun 26 13:33:24 server sshd\[27476\]: Invalid user ftpadmin from 139.59.213.237
Jun 26 13:33:24 server sshd\[27476\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.213.237
Jun 26 13:33:26 server sshd\[27476\]: Failed password for invalid user ftpadmin from 139.59.213.237 port 43338 ssh2
...
2019-07-12 07:18:38
45.227.254.26 attackspam
11.07.2019 14:04:28 Connection to port 3389 blocked by firewall
2019-07-12 07:41:14

Recently Reported IPs

138.97.34.92 138.97.34.229 138.97.34.99 138.97.34.248
138.97.35.250 138.97.35.200 138.97.35.92 118.194.242.55
138.97.35.94 138.97.36.234 138.97.37.138 138.97.37.143
138.97.36.178 138.97.37.10 138.97.37.212 138.97.41.250
138.97.37.171 118.194.242.56 118.194.242.59 118.194.242.60