Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.216.138.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36341
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;198.216.138.125.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 22:00:02 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 125.138.216.198.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 198.216.138.125.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
54.37.73.26 attackspambots
Sep 20 20:50:45 OPSO sshd\[19688\]: Invalid user vusa from 54.37.73.26 port 39112
Sep 20 20:50:45 OPSO sshd\[19688\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.73.26
Sep 20 20:50:47 OPSO sshd\[19688\]: Failed password for invalid user vusa from 54.37.73.26 port 39112 ssh2
Sep 20 20:54:54 OPSO sshd\[20450\]: Invalid user ROOT500 from 54.37.73.26 port 60051
Sep 20 20:54:54 OPSO sshd\[20450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.73.26
2019-09-21 03:06:48
162.212.162.152 attackbotsspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/162.212.162.152/ 
 US - 1H : (191)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : US 
 NAME ASN : ASN36423 
 
 IP : 162.212.162.152 
 
 CIDR : 162.212.160.0/22 
 
 PREFIX COUNT : 197 
 
 UNIQUE IP COUNT : 158976 
 
 
 WYKRYTE ATAKI Z ASN36423 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery
2019-09-21 03:13:29
85.144.226.170 attack
2019-09-20T18:54:52.849362abusebot-5.cloudsearch.cf sshd\[16713\]: Invalid user iceman from 85.144.226.170 port 38878
2019-09-21 03:26:37
213.32.67.160 attack
2019-09-20T19:23:40.921521abusebot-7.cloudsearch.cf sshd\[10950\]: Invalid user tomcat from 213.32.67.160 port 44911
2019-09-21 03:29:19
51.255.44.56 attackspam
Reported by AbuseIPDB proxy server.
2019-09-21 03:36:23
41.105.83.86 attackbotsspam
Sep 20 20:18:30 nirvana postfix/smtpd[8308]: connect from unknown[41.105.83.86]
Sep 20 20:18:31 nirvana postfix/smtpd[8308]: warning: unknown[41.105.83.86]: SASL CRAM-MD5 authentication failed: authentication failure
Sep 20 20:18:32 nirvana postfix/smtpd[8308]: warning: unknown[41.105.83.86]: SASL PLAIN authentication failed: authentication failure
Sep 20 20:18:32 nirvana postfix/smtpd[8308]: warning: unknown[41.105.83.86]: SASL LOGIN authentication failed: authentication failure
Sep 20 20:18:32 nirvana postfix/smtpd[8308]: lost connection after AUTH from unknown[41.105.83.86]
Sep 20 20:18:32 nirvana postfix/smtpd[8308]: disconnect from unknown[41.105.83.86]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=41.105.83.86
2019-09-21 03:34:58
179.108.105.151 attackspambots
Sep 20 21:22:05 vps691689 sshd[27382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.108.105.151
Sep 20 21:22:07 vps691689 sshd[27382]: Failed password for invalid user deploy from 179.108.105.151 port 40732 ssh2
...
2019-09-21 03:28:34
51.254.220.20 attackspam
Sep 20 09:05:33 lcprod sshd\[15454\]: Invalid user cvs from 51.254.220.20
Sep 20 09:05:33 lcprod sshd\[15454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.ip-51-254-220.eu
Sep 20 09:05:35 lcprod sshd\[15454\]: Failed password for invalid user cvs from 51.254.220.20 port 48603 ssh2
Sep 20 09:09:34 lcprod sshd\[15905\]: Invalid user pink from 51.254.220.20
Sep 20 09:09:34 lcprod sshd\[15905\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.ip-51-254-220.eu
2019-09-21 03:10:30
63.83.73.126 attackspambots
Lines containing failures of 63.83.73.126


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=63.83.73.126
2019-09-21 03:25:03
212.86.99.167 attackspam
2019-09-20 x@x
2019-09-20 x@x
2019-09-20 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=212.86.99.167
2019-09-21 02:59:41
137.74.152.156 attackspam
Sep 20 19:23:54 localhost sshd\[45704\]: Invalid user user from 137.74.152.156 port 34758
Sep 20 19:23:54 localhost sshd\[45704\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.152.156
Sep 20 19:23:57 localhost sshd\[45704\]: Failed password for invalid user user from 137.74.152.156 port 34758 ssh2
Sep 20 19:28:07 localhost sshd\[45811\]: Invalid user landscape from 137.74.152.156 port 54010
Sep 20 19:28:07 localhost sshd\[45811\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.152.156
...
2019-09-21 03:28:55
178.116.159.202 attack
Sep 20 20:58:48 [host] sshd[1713]: Invalid user public from 178.116.159.202
Sep 20 20:58:48 [host] sshd[1713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.116.159.202
Sep 20 20:58:51 [host] sshd[1713]: Failed password for invalid user public from 178.116.159.202 port 36909 ssh2
2019-09-21 03:11:28
106.13.84.25 attackspambots
Sep 20 20:50:48 OPSO sshd\[19692\]: Invalid user vserver from 106.13.84.25 port 44110
Sep 20 20:50:48 OPSO sshd\[19692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.84.25
Sep 20 20:50:50 OPSO sshd\[19692\]: Failed password for invalid user vserver from 106.13.84.25 port 44110 ssh2
Sep 20 20:54:51 OPSO sshd\[20382\]: Invalid user upload from 106.13.84.25 port 51018
Sep 20 20:54:51 OPSO sshd\[20382\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.84.25
2019-09-21 03:04:16
180.168.156.214 attack
SSH Brute Force, server-1 sshd[4556]: Failed password for invalid user cg from 180.168.156.214 port 24079 ssh2
2019-09-21 02:57:44
222.186.31.144 attack
2019-09-21T02:17:36.625329enmeeting.mahidol.ac.th sshd\[26022\]: User root from 222.186.31.144 not allowed because not listed in AllowUsers
2019-09-21T02:17:36.978110enmeeting.mahidol.ac.th sshd\[26022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.144  user=root
2019-09-21T02:17:38.553729enmeeting.mahidol.ac.th sshd\[26022\]: Failed password for invalid user root from 222.186.31.144 port 60298 ssh2
...
2019-09-21 03:18:30

Recently Reported IPs

24.2.128.136 251.72.211.180 120.112.72.18 201.169.23.174
70.154.106.140 246.171.22.103 159.181.218.87 155.116.105.63
141.109.179.172 9.113.78.130 239.94.252.162 203.24.94.118
81.187.187.177 49.179.116.74 231.140.246.196 194.139.156.133
198.164.67.189 80.171.63.174 205.60.66.204 167.64.153.7