Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.224.0.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30335
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;158.224.0.138.			IN	A

;; AUTHORITY SECTION:
.			413	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020090702 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Sep 08 07:01:49 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 138.0.224.158.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 138.0.224.158.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
83.175.213.250 attackbots
Nov  7 09:08:54 server sshd\[3772\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.175.213.250  user=root
Nov  7 09:08:57 server sshd\[3772\]: Failed password for root from 83.175.213.250 port 53396 ssh2
Nov  7 09:19:01 server sshd\[6318\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.175.213.250  user=root
Nov  7 09:19:03 server sshd\[6318\]: Failed password for root from 83.175.213.250 port 53514 ssh2
Nov  7 09:23:54 server sshd\[7574\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.175.213.250  user=root
...
2019-11-07 19:11:31
134.209.29.118 attack
134.209.29.118 was recorded 6 times by 6 hosts attempting to connect to the following ports: 5900. Incident counter (4h, 24h, all-time): 6, 9, 9
2019-11-07 19:23:45
139.199.159.77 attackspambots
2019-11-07T08:35:19.649229abusebot-4.cloudsearch.cf sshd\[4845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.159.77  user=root
2019-11-07 18:55:24
41.223.142.211 attackbots
Nov  7 16:54:53 vibhu-HP-Z238-Microtower-Workstation sshd\[25986\]: Invalid user !QAZ3edc%TGBg from 41.223.142.211
Nov  7 16:54:53 vibhu-HP-Z238-Microtower-Workstation sshd\[25986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.223.142.211
Nov  7 16:54:55 vibhu-HP-Z238-Microtower-Workstation sshd\[25986\]: Failed password for invalid user !QAZ3edc%TGBg from 41.223.142.211 port 56637 ssh2
Nov  7 16:59:58 vibhu-HP-Z238-Microtower-Workstation sshd\[26165\]: Invalid user steamsteam from 41.223.142.211
Nov  7 16:59:58 vibhu-HP-Z238-Microtower-Workstation sshd\[26165\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.223.142.211
...
2019-11-07 19:30:02
177.38.87.173 attack
Nov  7 06:23:41 mercury auth[20583]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=josh@learnargentinianspanish.com rhost=177.38.87.173
...
2019-11-07 19:17:40
14.204.211.122 attackspam
port scan and connect, tcp 1433 (ms-sql-s)
2019-11-07 19:16:09
27.79.138.198 attackspambots
Nov  7 06:23:42 *** sshd[16192]: Invalid user admin from 27.79.138.198
2019-11-07 19:17:22
129.204.130.77 attackspambots
Nov  5 23:44:03 host2 sshd[11298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.130.77  user=r.r
Nov  5 23:44:04 host2 sshd[11298]: Failed password for r.r from 129.204.130.77 port 36500 ssh2
Nov  5 23:44:05 host2 sshd[11298]: Received disconnect from 129.204.130.77: 11: Bye Bye [preauth]
Nov  5 23:52:46 host2 sshd[9564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.130.77  user=r.r
Nov  5 23:52:48 host2 sshd[9564]: Failed password for r.r from 129.204.130.77 port 37143 ssh2
Nov  5 23:52:48 host2 sshd[9564]: Received disconnect from 129.204.130.77: 11: Bye Bye [preauth]
Nov  5 23:57:46 host2 sshd[26531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.130.77  user=r.r
Nov  5 23:57:48 host2 sshd[26531]: Failed password for r.r from 129.204.130.77 port 56430 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=12
2019-11-07 18:53:47
45.82.32.114 attack
Lines containing failures of 45.82.32.114
Nov  7 06:26:23 shared04 postfix/smtpd[29214]: connect from scull.oliviertylczak.com[45.82.32.114]
Nov  7 06:26:23 shared04 policyd-spf[29215]: prepend Received-SPF: Pass (mailfrom) identhostnamey=mailfrom; client-ip=45.82.32.114; helo=scull.downloadmodets.co; envelope-from=x@x
Nov x@x
Nov  7 06:26:23 shared04 postfix/smtpd[29214]: disconnect from scull.oliviertylczak.com[45.82.32.114] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5
Nov  7 06:26:36 shared04 postfix/smtpd[22691]: connect from scull.oliviertylczak.com[45.82.32.114]
Nov  7 06:26:37 shared04 policyd-spf[26681]: prepend Received-SPF: Pass (mailfrom) identhostnamey=mailfrom; client-ip=45.82.32.114; helo=scull.downloadmodets.co; envelope-from=x@x
Nov x@x
Nov  7 06:26:37 shared04 postfix/smtpd[22691]: disconnect from scull.oliviertylczak.com[45.82.32.114] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5
Nov  7 06:26:58 shared04 postfix/smtpd[29214]: co........
------------------------------
2019-11-07 19:27:19
178.33.233.54 attack
Nov  7 09:29:28 nextcloud sshd\[13900\]: Invalid user nagios1234 from 178.33.233.54
Nov  7 09:29:28 nextcloud sshd\[13900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.233.54
Nov  7 09:29:30 nextcloud sshd\[13900\]: Failed password for invalid user nagios1234 from 178.33.233.54 port 54650 ssh2
...
2019-11-07 19:23:23
165.227.115.93 attack
$f2bV_matches
2019-11-07 19:08:38
80.82.77.33 attackspambots
11/07/2019-11:11:27.370849 80.82.77.33 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-07 19:32:47
117.195.0.111 attackspambots
Unauthorised access (Nov  7) SRC=117.195.0.111 LEN=48 TTL=108 ID=33748 DF TCP DPT=445 WINDOW=65535 SYN
2019-11-07 19:33:33
96.8.116.171 attack
firewall-block, port(s): 53413/udp
2019-11-07 19:16:47
45.82.32.152 attackspambots
Nov  7 06:16:24 web01 postfix/smtpd[8002]: connect from talk.oliviertylczak.com[45.82.32.152]
Nov  7 06:16:24 web01 policyd-spf[9302]: None; identhostnamey=helo; client-ip=45.82.32.152; helo=talk.lnndc.com; envelope-from=x@x
Nov  7 06:16:24 web01 policyd-spf[9302]: Pass; identhostnamey=mailfrom; client-ip=45.82.32.152; helo=talk.lnndc.com; envelope-from=x@x
Nov x@x
Nov  7 06:16:25 web01 postfix/smtpd[8002]: disconnect from talk.oliviertylczak.com[45.82.32.152]
Nov  7 06:16:33 web01 postfix/smtpd[8002]: connect from talk.oliviertylczak.com[45.82.32.152]
Nov  7 06:16:33 web01 policyd-spf[9302]: None; identhostnamey=helo; client-ip=45.82.32.152; helo=talk.lnndc.com; envelope-from=x@x
Nov  7 06:16:33 web01 policyd-spf[9302]: Pass; identhostnamey=mailfrom; client-ip=45.82.32.152; helo=talk.lnndc.com; envelope-from=x@x
Nov x@x
Nov  7 06:16:33 web01 postfix/smtpd[8002]: disconnect from talk.oliviertylczak.com[45.82.32.152]
Nov  7 06:25:24 web01 postfix/smtpd[9127]: connect fro........
-------------------------------
2019-11-07 19:26:03

Recently Reported IPs

162.247.166.97 86.107.55.243 183.6.30.98 46.207.55.20
112.194.82.78 148.73.69.239 49.73.177.108 177.92.247.48
129.204.113.241 113.110.214.225 201.116.123.175 124.133.246.77
60.86.152.90 178.128.232.28 5.190.81.105 116.129.254.135
113.161.82.85 154.221.28.101 82.141.161.227 186.94.152.50