Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.106.138.97
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41280
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;158.106.138.97.			IN	A

;; AUTHORITY SECTION:
.			443	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 19:17:38 CST 2022
;; MSG SIZE  rcvd: 107
Host info
97.138.106.158.in-addr.arpa domain name pointer host.hostspectrum.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
97.138.106.158.in-addr.arpa	name = host.hostspectrum.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
203.234.230.23 attackbots
RUSSIAN PHISHING SPAM !
2019-10-09 07:05:25
159.65.9.28 attack
2019-10-08T22:51:46.148108abusebot-5.cloudsearch.cf sshd\[10505\]: Invalid user Adolph2017 from 159.65.9.28 port 50758
2019-10-09 07:30:27
106.12.126.42 attackspambots
Oct  8 13:06:26 php1 sshd\[5071\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.126.42  user=root
Oct  8 13:06:28 php1 sshd\[5071\]: Failed password for root from 106.12.126.42 port 33628 ssh2
Oct  8 13:10:46 php1 sshd\[5577\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.126.42  user=root
Oct  8 13:10:48 php1 sshd\[5577\]: Failed password for root from 106.12.126.42 port 39568 ssh2
Oct  8 13:15:13 php1 sshd\[5979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.126.42  user=root
2019-10-09 07:23:24
129.204.244.2 attackbotsspam
Oct  8 13:34:35 *** sshd[18429]: Failed password for invalid user 123 from 129.204.244.2 port 42958 ssh2
Oct  8 13:36:01 *** sshd[18453]: Failed password for invalid user Lille!23 from 129.204.244.2 port 55100 ssh2
Oct  8 13:43:26 *** sshd[18625]: Failed password for invalid user 123Press from 129.204.244.2 port 47300 ssh2
Oct  8 13:44:49 *** sshd[18656]: Failed password for invalid user Network123 from 129.204.244.2 port 59440 ssh2
Oct  8 13:47:41 *** sshd[18689]: Failed password for invalid user Maria1@3 from 129.204.244.2 port 55488 ssh2
2019-10-09 07:49:19
103.233.206.214 attackbots
Unauthorized connection attempt from IP address 103.233.206.214 on Port 445(SMB)
2019-10-09 07:48:02
208.180.1.182 attackspambots
Unauthorized connection attempt from IP address 208.180.1.182 on Port 445(SMB)
2019-10-09 07:27:47
222.186.175.151 attackspam
Oct  8 23:43:21 sshgateway sshd\[17428\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.151  user=root
Oct  8 23:43:23 sshgateway sshd\[17428\]: Failed password for root from 222.186.175.151 port 60934 ssh2
Oct  8 23:43:40 sshgateway sshd\[17428\]: error: maximum authentication attempts exceeded for root from 222.186.175.151 port 60934 ssh2 \[preauth\]
2019-10-09 07:46:56
213.136.77.106 attackbots
Fail2Ban Ban Triggered
2019-10-09 07:18:14
82.81.133.15 attackbotsspam
Automatic report - Port Scan Attack
2019-10-09 07:44:56
222.173.143.34 attackbots
Unauthorized connection attempt from IP address 222.173.143.34 on Port 445(SMB)
2019-10-09 07:05:07
218.17.56.50 attack
Oct  8 21:45:25 apollo sshd\[8511\]: Failed password for root from 218.17.56.50 port 37172 ssh2Oct  8 21:52:00 apollo sshd\[8540\]: Failed password for root from 218.17.56.50 port 39057 ssh2Oct  8 22:02:05 apollo sshd\[8584\]: Failed password for root from 218.17.56.50 port 56017 ssh2
...
2019-10-09 07:31:39
101.95.17.118 attack
Unauthorized connection attempt from IP address 101.95.17.118 on Port 445(SMB)
2019-10-09 07:44:41
190.171.251.141 attack
Unauthorized connection attempt from IP address 190.171.251.141 on Port 445(SMB)
2019-10-09 07:32:29
118.89.247.74 attack
Oct  8 11:38:53 kapalua sshd\[22940\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.247.74  user=root
Oct  8 11:38:54 kapalua sshd\[22940\]: Failed password for root from 118.89.247.74 port 32830 ssh2
Oct  8 11:41:38 kapalua sshd\[23327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.247.74  user=root
Oct  8 11:41:40 kapalua sshd\[23327\]: Failed password for root from 118.89.247.74 port 56930 ssh2
Oct  8 11:44:25 kapalua sshd\[23555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.247.74  user=root
2019-10-09 07:12:31
79.157.219.241 attack
SSH/22 MH Probe, BF, Hack -
2019-10-09 07:05:38

Recently Reported IPs

158.106.136.211 158.106.138.206 158.106.138.77 158.106.138.237
158.106.138.209 158.106.142.154 158.106.142.195 158.106.142.77
158.106.184.151 158.106.138.98 135.95.184.15 158.115.233.191
158.106.187.63 158.106.188.239 158.106.188.175 158.106.84.32
158.106.142.95 158.129.159.145 158.126.248.153 158.129.170.82