Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.98.235.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31444
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;197.98.235.138.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019080600 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Aug 06 22:25:59 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 138.235.98.197.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 138.235.98.197.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
220.78.28.68 attack
sshd jail - ssh hack attempt
2020-08-04 23:19:54
178.62.234.124 attack
Brute-force attempt banned
2020-08-04 23:25:42
115.159.53.215 attackbots
Aug  4 09:21:37 *** sshd[9304]: User root from 115.159.53.215 not allowed because not listed in AllowUsers
2020-08-04 23:36:47
111.161.41.156 attackspambots
Multiple SSH authentication failures from 111.161.41.156
2020-08-04 23:45:30
148.229.3.242 attack
Aug  4 23:40:09 localhost sshd[3474027]: Connection closed by 148.229.3.242 port 34914 [preauth]
...
2020-08-04 23:41:50
210.19.35.122 attackbotsspam
08/04/2020-05:21:19.024668 210.19.35.122 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-08-04 23:57:27
72.143.100.14 attackspam
"Unauthorized connection attempt on SSHD detected"
2020-08-04 23:54:01
106.13.164.136 attackbots
Aug  4 11:19:44 master sshd[21214]: Failed password for root from 106.13.164.136 port 42326 ssh2
Aug  4 11:29:25 master sshd[21403]: Failed password for root from 106.13.164.136 port 50798 ssh2
Aug  4 11:32:32 master sshd[21854]: Failed password for root from 106.13.164.136 port 56872 ssh2
Aug  4 11:35:34 master sshd[21923]: Failed password for root from 106.13.164.136 port 34716 ssh2
Aug  4 11:38:32 master sshd[21959]: Failed password for root from 106.13.164.136 port 40790 ssh2
Aug  4 11:41:36 master sshd[22098]: Failed password for root from 106.13.164.136 port 46864 ssh2
Aug  4 11:44:37 master sshd[22127]: Failed password for root from 106.13.164.136 port 52940 ssh2
Aug  4 11:47:31 master sshd[22220]: Failed password for root from 106.13.164.136 port 59014 ssh2
Aug  4 11:50:26 master sshd[22336]: Failed password for root from 106.13.164.136 port 36856 ssh2
Aug  4 11:53:30 master sshd[22376]: Failed password for root from 106.13.164.136 port 42930 ssh2
2020-08-04 23:44:02
194.26.29.117 attackbotsspam
08/04/2020-11:32:36.638021 194.26.29.117 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-08-04 23:44:51
106.13.217.102 attack
Aug 4 13:14:20 *hidden* sshd[60043]: Failed password for *hidden* from 106.13.217.102 port 37370 ssh2 Aug 4 13:19:00 *hidden* sshd[6161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.217.102 user=root Aug 4 13:19:02 *hidden* sshd[6161]: Failed password for *hidden* from 106.13.217.102 port 39458 ssh2 Aug 4 13:23:47 *hidden* sshd[17459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.217.102 user=root Aug 4 13:23:49 *hidden* sshd[17459]: Failed password for *hidden* from 106.13.217.102 port 41526 ssh2
2020-08-04 23:15:44
222.180.150.138 attackbots
Aug  4 11:21:56 debian-2gb-nbg1-2 kernel: \[18791382.528659\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=222.180.150.138 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=238 ID=28580 PROTO=TCP SPT=43739 DPT=1433 WINDOW=1024 RES=0x00 SYN URGP=0
2020-08-04 23:22:01
84.38.187.195 attackspam
Fail2Ban Ban Triggered
2020-08-04 23:23:22
85.232.252.94 attack
Aug  4 00:16:21 php1 sshd\[28096\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.232.252.94  user=root
Aug  4 00:16:23 php1 sshd\[28096\]: Failed password for root from 85.232.252.94 port 37138 ssh2
Aug  4 00:17:58 php1 sshd\[28207\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.232.252.94  user=root
Aug  4 00:18:00 php1 sshd\[28207\]: Failed password for root from 85.232.252.94 port 18271 ssh2
Aug  4 00:19:28 php1 sshd\[28308\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.232.252.94  user=root
2020-08-04 23:24:16
79.13.246.39 attack
 TCP (SYN) 79.13.246.39:53646 -> port 139, len 44
2020-08-04 23:35:21
104.131.72.150 attackbotsspam
104.131.72.150 - - \[04/Aug/2020:11:21:30 +0200\] "GET / HTTP/1.0" 301 178 "-" "Mozilla/5.0 \(compatible\; NetcraftSurveyAgent/1.0\; +info@netcraft.com\)"
...
2020-08-04 23:43:35

Recently Reported IPs

170.207.83.244 248.40.135.175 113.124.191.37 81.114.23.19
0.64.54.61 85.94.166.126 123.122.56.171 35.238.42.201
169.35.169.85 188.158.30.208 89.240.27.234 34.77.158.159
201.222.70.167 139.5.8.239 119.42.123.101 217.146.88.72
95.244.133.183 228.17.15.121 165.22.106.224 44.60.61.89