Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.163.138.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47535
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.163.138.142.		IN	A

;; AUTHORITY SECTION:
.			276	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020800 1800 900 604800 86400

;; Query time: 52 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 16:17:18 CST 2022
;; MSG SIZE  rcvd: 108
Host info
142.138.163.194.in-addr.arpa domain name pointer live.mkamservices.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.138.163.194.in-addr.arpa	name = live.mkamservices.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
220.134.240.68 attackbotsspam
Honeypot attack, port: 81, PTR: 220-134-240-68.HINET-IP.hinet.net.
2020-03-03 08:35:09
187.141.182.125 attack
Unauthorized connection attempt from IP address 187.141.182.125 on Port 445(SMB)
2020-03-03 08:34:42
222.186.175.23 attackspam
Unauthorized connection attempt detected from IP address 222.186.175.23 to port 22 [J]
2020-03-03 08:56:52
189.160.234.88 attack
20/3/2@17:00:40: FAIL: Alarm-Network address from=189.160.234.88
...
2020-03-03 08:13:38
182.61.148.207 attackbotsspam
Port scan on 2 port(s): 2375 2376
2020-03-03 08:43:53
188.212.247.188 attack
Email rejected due to spam filtering
2020-03-03 08:21:25
115.44.243.152 attackbots
Mar  3 00:58:44 sd-53420 sshd\[13781\]: User root from 115.44.243.152 not allowed because none of user's groups are listed in AllowGroups
Mar  3 00:58:44 sd-53420 sshd\[13781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.44.243.152  user=root
Mar  3 00:58:45 sd-53420 sshd\[13781\]: Failed password for invalid user root from 115.44.243.152 port 52474 ssh2
Mar  3 01:07:18 sd-53420 sshd\[14571\]: Invalid user e from 115.44.243.152
Mar  3 01:07:18 sd-53420 sshd\[14571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.44.243.152
...
2020-03-03 08:14:43
92.118.161.17 attackbots
Unauthorized connection attempt detected from IP address 92.118.161.17 to port 7547 [J]
2020-03-03 08:58:58
146.158.1.119 attackspambots
Unauthorized connection attempt from IP address 146.158.1.119 on Port 445(SMB)
2020-03-03 08:18:40
84.198.151.38 attackbotsspam
Unauthorized connection attempt from IP address 84.198.151.38 on Port 445(SMB)
2020-03-03 08:27:42
189.8.68.80 attackbots
Mar  3 00:31:24 klukluk sshd\[8781\]: Invalid user mysql from 189.8.68.80
Mar  3 00:35:20 klukluk sshd\[11400\]: Invalid user oracle from 189.8.68.80
Mar  3 00:39:10 klukluk sshd\[13796\]: Invalid user postgres from 189.8.68.80
...
2020-03-03 08:33:12
95.23.32.223 attackspambots
Honeypot attack, port: 81, PTR: 223.32.23.95.dynamic.jazztel.es.
2020-03-03 08:26:13
151.185.15.90 attackspam
Honeypot attack, port: 445, PTR: admissionspfaids.pba.edu.
2020-03-03 08:21:40
24.138.136.109 attack
Unauthorized connection attempt detected from IP address 24.138.136.109 to port 5555 [J]
2020-03-03 08:18:57
186.91.74.79 attackspam
Unauthorized connection attempt from IP address 186.91.74.79 on Port 445(SMB)
2020-03-03 08:13:57

Recently Reported IPs

194.15.111.170 194.163.162.18 194.163.160.224 194.163.177.104
194.163.44.213 194.183.54.88 194.233.65.195 194.233.85.139
194.26.75.27 194.26.229.48 194.31.53.96 194.35.225.103
194.35.225.147 194.35.225.169 194.35.225.142 194.35.225.168
194.35.225.115 194.35.225.100 194.35.225.143 194.35.225.205