Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ostrava

Region: Moravskoslezsky kraj

Country: Czechia

Internet Service Provider: unknown

Hostname: unknown

Organization: CESNET z.s.p.o.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.196.138.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28388
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;158.196.138.213.		IN	A

;; AUTHORITY SECTION:
.			1843	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019073002 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jul 31 02:48:56 CST 2019
;; MSG SIZE  rcvd: 119
Host info
213.138.196.158.in-addr.arpa domain name pointer pca805a.vsb.cz.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
213.138.196.158.in-addr.arpa	name = pca805a.vsb.cz.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
139.59.249.255 attackspam
2020-04-20T15:54:47.317571abusebot-2.cloudsearch.cf sshd[21931]: Invalid user test1 from 139.59.249.255 port 31701
2020-04-20T15:54:47.325760abusebot-2.cloudsearch.cf sshd[21931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=blog.jungleland.co.id
2020-04-20T15:54:47.317571abusebot-2.cloudsearch.cf sshd[21931]: Invalid user test1 from 139.59.249.255 port 31701
2020-04-20T15:54:48.817476abusebot-2.cloudsearch.cf sshd[21931]: Failed password for invalid user test1 from 139.59.249.255 port 31701 ssh2
2020-04-20T15:59:51.385863abusebot-2.cloudsearch.cf sshd[22232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=blog.jungleland.co.id  user=root
2020-04-20T15:59:52.611976abusebot-2.cloudsearch.cf sshd[22232]: Failed password for root from 139.59.249.255 port 49916 ssh2
2020-04-20T16:04:42.869530abusebot-2.cloudsearch.cf sshd[22499]: Invalid user admin from 139.59.249.255 port 13182
...
2020-04-21 03:14:46
186.4.242.37 attackbots
SSH Brute-Forcing (server1)
2020-04-21 02:57:45
129.211.30.94 attackbots
$f2bV_matches
2020-04-21 03:19:04
134.122.76.222 attack
Apr 20 13:54:47 mail sshd\[65180\]: Invalid user yx from 134.122.76.222
Apr 20 13:54:47 mail sshd\[65180\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.76.222
...
2020-04-21 03:17:32
111.229.123.125 attack
SSH login attempts.
2020-04-21 03:28:41
156.222.104.60 attackbotsspam
Invalid user admin from 156.222.104.60 port 33396
2020-04-21 03:09:30
106.13.101.220 attackspam
Apr 20 20:16:21 cloud sshd[6253]: Failed password for root from 106.13.101.220 port 46880 ssh2
Apr 20 20:32:51 cloud sshd[6651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.101.220
2020-04-21 03:33:40
120.239.196.101 attackspambots
Invalid user admin from 120.239.196.101 port 50311
2020-04-21 03:24:15
114.67.100.245 attackspam
Apr 20 19:22:13 163-172-32-151 sshd[22641]: Invalid user test10 from 114.67.100.245 port 33790
...
2020-04-21 03:26:18
186.18.1.22 attackspam
Invalid user zj from 186.18.1.22 port 37064
2020-04-21 02:57:27
159.65.5.186 attackspam
Apr 20 15:14:48 hosting sshd[6835]: Invalid user ubuntu from 159.65.5.186 port 55150
...
2020-04-21 03:08:36
110.49.73.55 attack
Invalid user admin from 110.49.73.55 port 59000
2020-04-21 03:29:42
122.51.217.131 attackspambots
Apr 20 20:03:49 xeon sshd[56599]: Failed password for root from 122.51.217.131 port 47826 ssh2
2020-04-21 03:23:22
171.99.191.210 attackspam
failed_logins
2020-04-21 03:07:04
104.236.122.193 attackbotsspam
Invalid user DUP from 104.236.122.193 port 51186
2020-04-21 03:35:19

Recently Reported IPs

89.53.28.53 84.29.210.61 42.113.49.8 2.138.172.109
83.85.56.68 161.166.220.122 216.230.23.110 216.177.228.31
169.56.185.249 61.218.186.152 142.17.189.255 14.81.201.89
120.63.199.225 176.193.104.251 52.215.78.165 104.248.112.58
201.109.25.209 158.201.96.133 2001:44c8:444c:f68d:67a9:3fe8:485c:c8c7 174.187.106.133