Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.222.205.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35657
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.222.205.138.		IN	A

;; AUTHORITY SECTION:
.			465	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022102200 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 22 23:05:28 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 138.205.222.164.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.205.222.164.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
129.226.156.168 attackbots
1040/tcp 731/tcp
[2019-09-23/28]2pkt
2019-09-28 18:13:04
51.75.147.100 attackspam
Invalid user default from 51.75.147.100 port 46458
2019-09-28 17:56:24
155.94.254.64 attackbotsspam
Lines containing failures of 155.94.254.64
Sep 26 23:57:32 myhost sshd[28870]: Invalid user ua from 155.94.254.64 port 36572
Sep 26 23:57:32 myhost sshd[28870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=155.94.254.64
Sep 26 23:57:34 myhost sshd[28870]: Failed password for invalid user ua from 155.94.254.64 port 36572 ssh2
Sep 26 23:57:34 myhost sshd[28870]: Received disconnect from 155.94.254.64 port 36572:11: Bye Bye [preauth]
Sep 26 23:57:34 myhost sshd[28870]: Disconnected from invalid user ua 155.94.254.64 port 36572 [preauth]
Sep 27 00:07:46 myhost sshd[28963]: Invalid user cmsadmin from 155.94.254.64 port 58692
Sep 27 00:07:46 myhost sshd[28963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=155.94.254.64
Sep 27 00:07:49 myhost sshd[28963]: Failed password for invalid user cmsadmin from 155.94.254.64 port 58692 ssh2
Sep 27 00:07:49 myhost sshd[28963]: Received disconnect from 15........
------------------------------
2019-09-28 17:49:21
119.93.148.90 attack
445/tcp 445/tcp 445/tcp...
[2019-08-06/09-28]6pkt,1pt.(tcp)
2019-09-28 17:52:50
188.166.31.205 attackspambots
Sep 28 11:41:16 MK-Soft-VM3 sshd[3880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.31.205 
Sep 28 11:41:18 MK-Soft-VM3 sshd[3880]: Failed password for invalid user jordan from 188.166.31.205 port 55425 ssh2
...
2019-09-28 17:46:31
91.121.69.151 attackspam
2019-09-28T09:44:46.552047abusebot-3.cloudsearch.cf sshd\[11041\]: Invalid user edp from 91.121.69.151 port 9224
2019-09-28 17:53:17
182.61.186.210 attackbotsspam
10 attempts against mh-misc-ban on ice.magehost.pro
2019-09-28 17:51:32
45.89.175.110 attackbotsspam
Port scan attempt detected by AWS-CCS, CTS, India
2019-09-28 18:05:07
106.13.33.181 attackspam
$f2bV_matches
2019-09-28 18:00:40
218.92.0.132 attackbots
Sep 28 11:53:40 lnxded64 sshd[8116]: Failed password for root from 218.92.0.132 port 11927 ssh2
Sep 28 11:53:40 lnxded64 sshd[8116]: Failed password for root from 218.92.0.132 port 11927 ssh2
Sep 28 11:53:43 lnxded64 sshd[8116]: Failed password for root from 218.92.0.132 port 11927 ssh2
2019-09-28 17:56:46
59.72.112.47 attack
Sep 28 11:05:37 bouncer sshd\[31604\]: Invalid user rack from 59.72.112.47 port 59156
Sep 28 11:05:37 bouncer sshd\[31604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.72.112.47 
Sep 28 11:05:40 bouncer sshd\[31604\]: Failed password for invalid user rack from 59.72.112.47 port 59156 ssh2
...
2019-09-28 17:44:55
212.0.149.87 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-07-28/09-28]32pkt,1pt.(tcp)
2019-09-28 17:43:39
123.31.47.20 attackspam
Sep 27 23:52:37 auw2 sshd\[31634\]: Invalid user sysad from 123.31.47.20
Sep 27 23:52:37 auw2 sshd\[31634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.47.20
Sep 27 23:52:39 auw2 sshd\[31634\]: Failed password for invalid user sysad from 123.31.47.20 port 42746 ssh2
Sep 27 23:58:24 auw2 sshd\[32126\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.47.20  user=root
Sep 27 23:58:26 auw2 sshd\[32126\]: Failed password for root from 123.31.47.20 port 34195 ssh2
2019-09-28 18:00:14
200.46.231.146 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-08-14/09-28]8pkt,1pt.(tcp)
2019-09-28 17:59:27
223.245.213.189 attackspambots
Email spam message
2019-09-28 18:08:36

Recently Reported IPs

51.10.200.51 197.147.232.242 171.170.57.184 9.25.74.58
188.82.9.147 192.145.181.224 201.50.25.212 142.159.74.15
173.54.93.84 62.165.245.23 199.184.222.236 152.210.194.77
213.15.157.24 187.5.88.232 91.220.124.25 240.153.123.250
14.137.32.113 198.178.103.5 3.50.95.191 255.49.148.22