Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.99.138.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32045
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.99.138.80.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121300 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 13 20:43:36 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 80.138.99.194.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 80.138.99.194.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.12.98.94 attackspambots
Aug 29 12:52:13 game-panel sshd[20335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.98.94
Aug 29 12:52:15 game-panel sshd[20335]: Failed password for invalid user bigdiawusr from 106.12.98.94 port 39426 ssh2
Aug 29 12:57:51 game-panel sshd[20512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.98.94
2019-08-29 20:59:46
138.197.180.16 attackspambots
Aug 29 06:16:37 server1 sshd\[23371\]: Invalid user test from 138.197.180.16
Aug 29 06:16:37 server1 sshd\[23371\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.180.16 
Aug 29 06:16:38 server1 sshd\[23371\]: Failed password for invalid user test from 138.197.180.16 port 36766 ssh2
Aug 29 06:17:37 server1 sshd\[23626\]: Invalid user admin from 138.197.180.16
Aug 29 06:17:37 server1 sshd\[23626\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.180.16 
...
2019-08-29 20:56:34
115.236.100.114 attackbotsspam
$f2bV_matches
2019-08-29 20:44:47
201.24.185.199 attackspam
Aug 29 15:51:07 yabzik sshd[29315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.24.185.199
Aug 29 15:51:08 yabzik sshd[29315]: Failed password for invalid user taras from 201.24.185.199 port 41998 ssh2
Aug 29 16:00:46 yabzik sshd[369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.24.185.199
2019-08-29 21:29:22
208.68.36.133 attack
Aug 29 12:29:27 hcbbdb sshd\[16828\]: Invalid user vonda from 208.68.36.133
Aug 29 12:29:27 hcbbdb sshd\[16828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.68.36.133
Aug 29 12:29:28 hcbbdb sshd\[16828\]: Failed password for invalid user vonda from 208.68.36.133 port 43552 ssh2
Aug 29 12:33:33 hcbbdb sshd\[17231\]: Invalid user harvey from 208.68.36.133
Aug 29 12:33:33 hcbbdb sshd\[17231\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.68.36.133
2019-08-29 20:40:57
103.26.41.241 attack
Aug 29 13:32:01 cp sshd[18106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.26.41.241
2019-08-29 21:04:46
139.198.122.90 attack
2019-08-29T11:00:44.922321abusebot-2.cloudsearch.cf sshd\[32743\]: Invalid user marius from 139.198.122.90 port 48376
2019-08-29 20:37:55
58.215.121.36 attack
Invalid user zabbix from 58.215.121.36 port 44926
2019-08-29 21:34:49
178.140.55.9 attack
Aug 29 12:25:55 www1 sshd\[57736\]: Failed password for root from 178.140.55.9 port 43861 ssh2Aug 29 12:26:01 www1 sshd\[57736\]: Failed password for root from 178.140.55.9 port 43861 ssh2Aug 29 12:26:03 www1 sshd\[57736\]: Failed password for root from 178.140.55.9 port 43861 ssh2Aug 29 12:26:05 www1 sshd\[57736\]: Failed password for root from 178.140.55.9 port 43861 ssh2Aug 29 12:26:11 www1 sshd\[57767\]: Failed password for root from 178.140.55.9 port 43876 ssh2Aug 29 12:26:27 www1 sshd\[57785\]: Failed password for root from 178.140.55.9 port 43892 ssh2
...
2019-08-29 21:00:55
106.52.106.61 attackspambots
Aug 29 02:47:00 hiderm sshd\[20551\]: Invalid user marco from 106.52.106.61
Aug 29 02:47:00 hiderm sshd\[20551\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.106.61
Aug 29 02:47:02 hiderm sshd\[20551\]: Failed password for invalid user marco from 106.52.106.61 port 56236 ssh2
Aug 29 02:49:56 hiderm sshd\[20802\]: Invalid user jessie from 106.52.106.61
Aug 29 02:49:56 hiderm sshd\[20802\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.106.61
2019-08-29 21:11:42
190.111.239.219 attackbots
Aug 29 02:33:06 php1 sshd\[30220\]: Invalid user apps from 190.111.239.219
Aug 29 02:33:06 php1 sshd\[30220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.111.239.219
Aug 29 02:33:08 php1 sshd\[30220\]: Failed password for invalid user apps from 190.111.239.219 port 41616 ssh2
Aug 29 02:38:32 php1 sshd\[30692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.111.239.219  user=root
Aug 29 02:38:34 php1 sshd\[30692\]: Failed password for root from 190.111.239.219 port 59176 ssh2
2019-08-29 20:45:24
52.164.211.22 attackspam
Aug 29 09:31:44 unicornsoft sshd\[16818\]: Invalid user qtss from 52.164.211.22
Aug 29 09:31:44 unicornsoft sshd\[16818\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.164.211.22
Aug 29 09:31:46 unicornsoft sshd\[16818\]: Failed password for invalid user qtss from 52.164.211.22 port 54504 ssh2
2019-08-29 21:40:09
118.165.101.25 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-29 20:59:16
116.53.40.64 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-29 20:40:26
134.249.133.197 attackspambots
Automated report - ssh fail2ban:
Aug 29 13:56:36 authentication failure 
Aug 29 13:56:38 wrong password, user=mc, port=38312, ssh2
Aug 29 14:01:45 authentication failure
2019-08-29 20:49:55

Recently Reported IPs

147.219.12.131 216.130.111.60 4.253.225.105 178.7.103.44
148.38.140.132 85.3.211.106 36.211.231.23 122.110.99.218
45.246.252.164 205.139.25.121 32.218.113.210 250.5.235.144
116.109.150.97 13.35.253.159 237.2.101.107 144.26.213.35
249.123.206.78 40.95.113.120 220.239.218.239 255.41.47.40