Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.225.224.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35851
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.225.224.138.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025070500 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 05 20:38:50 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 138.224.225.164.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.224.225.164.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.69.218.114 attack
proto=tcp  .  spt=48357  .  dpt=25  .     (listed on     Github Combined on 3 lists )     (831)
2019-09-08 17:21:44
218.98.26.169 attackspam
Sep  8 04:53:32 TORMINT sshd\[30605\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.26.169  user=root
Sep  8 04:53:33 TORMINT sshd\[30605\]: Failed password for root from 218.98.26.169 port 44005 ssh2
Sep  8 04:53:40 TORMINT sshd\[30609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.26.169  user=root
...
2019-09-08 17:11:37
165.22.58.108 attackspambots
Sep  7 23:02:24 kapalua sshd\[8432\]: Invalid user guest2 from 165.22.58.108
Sep  7 23:02:24 kapalua sshd\[8432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.58.108
Sep  7 23:02:26 kapalua sshd\[8432\]: Failed password for invalid user guest2 from 165.22.58.108 port 48722 ssh2
Sep  7 23:07:01 kapalua sshd\[8901\]: Invalid user ansible from 165.22.58.108
Sep  7 23:07:01 kapalua sshd\[8901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.58.108
2019-09-08 17:23:57
34.93.239.122 attackbots
$f2bV_matches_ltvn
2019-09-08 17:36:22
200.98.137.26 attack
445/tcp 445/tcp 445/tcp
[2019-08-19/09-08]3pkt
2019-09-08 17:18:54
27.207.154.66 attack
" "
2019-09-08 17:17:43
218.98.40.140 attack
Sep  8 09:08:58 *** sshd[31719]: User root from 218.98.40.140 not allowed because not listed in AllowUsers
2019-09-08 17:29:06
106.12.12.7 attack
Sep  8 11:16:14 server01 sshd\[8540\]: Invalid user hadoop from 106.12.12.7
Sep  8 11:16:14 server01 sshd\[8540\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.12.7
Sep  8 11:16:16 server01 sshd\[8540\]: Failed password for invalid user hadoop from 106.12.12.7 port 55106 ssh2
...
2019-09-08 18:22:42
190.4.63.190 attackspam
445/tcp 445/tcp 445/tcp...
[2019-08-17/09-08]7pkt,1pt.(tcp)
2019-09-08 17:16:44
85.219.185.50 attackspambots
Sep  7 23:01:40 friendsofhawaii sshd\[17460\]: Invalid user test from 85.219.185.50
Sep  7 23:01:40 friendsofhawaii sshd\[17460\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=s185pc50.mmj.pl
Sep  7 23:01:42 friendsofhawaii sshd\[17460\]: Failed password for invalid user test from 85.219.185.50 port 36352 ssh2
Sep  7 23:05:47 friendsofhawaii sshd\[17825\]: Invalid user odoo from 85.219.185.50
Sep  7 23:05:47 friendsofhawaii sshd\[17825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=s185pc50.mmj.pl
2019-09-08 17:09:05
178.33.47.180 attackbotsspam
445/tcp 445/tcp 445/tcp...
[2019-07-09/09-08]10pkt,1pt.(tcp)
2019-09-08 17:21:28
138.68.94.173 attack
$f2bV_matches_ltvn
2019-09-08 17:48:33
193.194.89.146 attackbots
SSH Brute Force, server-1 sshd[2623]: Failed password for invalid user devops from 193.194.89.146 port 60890 ssh2
2019-09-08 17:12:17
37.44.253.159 attack
They're FCKING HACKERS.
2019-09-08 18:41:46
190.149.59.82 attack
445/tcp 445/tcp 445/tcp...
[2019-07-21/09-08]7pkt,1pt.(tcp)
2019-09-08 17:56:54

Recently Reported IPs

74.125.51.26 116.34.158.56 94.151.32.34 184.156.119.18
70.68.72.14 54.64.116.138 91.20.196.60 27.245.226.232
44.42.163.83 203.54.71.63 170.76.47.46 131.46.142.57
220.3.172.231 107.115.188.17 175.80.77.88 165.154.234.193
165.154.234.211 114.10.100.114 150.189.183.66 47.84.73.192