Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Sant Just Desvern

Region: Catalonia

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.138.214.24
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52092
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.138.214.24.			IN	A

;; AUTHORITY SECTION:
.			555	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020053101 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 01 08:03:09 CST 2020
;; MSG SIZE  rcvd: 116
Host info
24.214.138.2.in-addr.arpa domain name pointer 24.red-2-138-214.dynamicip.rima-tde.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
24.214.138.2.in-addr.arpa	name = 24.red-2-138-214.dynamicip.rima-tde.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
177.81.27.78 attackbots
Sep 13 19:00:40 ns382633 sshd\[3289\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.81.27.78  user=root
Sep 13 19:00:43 ns382633 sshd\[3289\]: Failed password for root from 177.81.27.78 port 21582 ssh2
Sep 13 19:04:58 ns382633 sshd\[3696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.81.27.78  user=root
Sep 13 19:05:00 ns382633 sshd\[3696\]: Failed password for root from 177.81.27.78 port 45453 ssh2
Sep 13 19:07:34 ns382633 sshd\[4390\]: Invalid user admin from 177.81.27.78 port 60020
Sep 13 19:07:34 ns382633 sshd\[4390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.81.27.78
2020-09-14 04:20:18
61.177.172.61 attackbots
Sep 13 22:24:16 plg sshd[2174]: Failed none for invalid user root from 61.177.172.61 port 53171 ssh2
Sep 13 22:24:17 plg sshd[2174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.61  user=root
Sep 13 22:24:19 plg sshd[2174]: Failed password for invalid user root from 61.177.172.61 port 53171 ssh2
Sep 13 22:24:23 plg sshd[2174]: Failed password for invalid user root from 61.177.172.61 port 53171 ssh2
Sep 13 22:24:26 plg sshd[2174]: Failed password for invalid user root from 61.177.172.61 port 53171 ssh2
Sep 13 22:24:31 plg sshd[2174]: Failed password for invalid user root from 61.177.172.61 port 53171 ssh2
Sep 13 22:24:37 plg sshd[2174]: Failed password for invalid user root from 61.177.172.61 port 53171 ssh2
Sep 13 22:24:37 plg sshd[2174]: error: maximum authentication attempts exceeded for invalid user root from 61.177.172.61 port 53171 ssh2 [preauth]
...
2020-09-14 04:26:14
45.129.33.44 attackbots
ET DROP Dshield Block Listed Source group 1 - port: 12427 proto: tcp cat: Misc Attackbytes: 60
2020-09-14 04:24:43
51.81.245.87 attackspam
SSH invalid-user multiple login try
2020-09-14 04:09:51
37.139.23.222 attackspam
B: Abusive ssh attack
2020-09-14 04:33:05
42.99.180.135 attack
Sep 13 20:15:47 pkdns2 sshd\[11749\]: Invalid user hubert from 42.99.180.135Sep 13 20:15:49 pkdns2 sshd\[11749\]: Failed password for invalid user hubert from 42.99.180.135 port 43700 ssh2Sep 13 20:18:30 pkdns2 sshd\[11863\]: Invalid user 888888 from 42.99.180.135Sep 13 20:18:32 pkdns2 sshd\[11863\]: Failed password for invalid user 888888 from 42.99.180.135 port 39136 ssh2Sep 13 20:21:12 pkdns2 sshd\[12016\]: Invalid user blaster from 42.99.180.135Sep 13 20:21:14 pkdns2 sshd\[12016\]: Failed password for invalid user blaster from 42.99.180.135 port 34586 ssh2
...
2020-09-14 04:29:50
18.141.56.216 attackbots
Sep 13 22:07:56 h1745522 sshd[11326]: Invalid user FIELD from 18.141.56.216 port 40396
Sep 13 22:07:56 h1745522 sshd[11326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.141.56.216
Sep 13 22:07:56 h1745522 sshd[11326]: Invalid user FIELD from 18.141.56.216 port 40396
Sep 13 22:07:57 h1745522 sshd[11326]: Failed password for invalid user FIELD from 18.141.56.216 port 40396 ssh2
Sep 13 22:11:39 h1745522 sshd[11909]: Invalid user luke from 18.141.56.216 port 46230
Sep 13 22:11:39 h1745522 sshd[11909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.141.56.216
Sep 13 22:11:39 h1745522 sshd[11909]: Invalid user luke from 18.141.56.216 port 46230
Sep 13 22:11:41 h1745522 sshd[11909]: Failed password for invalid user luke from 18.141.56.216 port 46230 ssh2
Sep 13 22:15:22 h1745522 sshd[12450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.141.56.216  user=root

...
2020-09-14 04:38:44
5.6.7.8 attackbots
Part of the Luminati trojan network.
2020-09-14 04:34:56
61.223.4.118 attackspam
firewall-block, port(s): 23/tcp
2020-09-14 04:05:08
111.42.190.3 attackbots
2020-09-13 13:35:32.779000-0500  localhost screensharingd[89902]: Authentication: FAILED :: User Name: N/A :: Viewer Address: 111.42.190.3 :: Type: VNC DES
2020-09-14 04:06:52
101.32.41.101 attack
Sep 14 03:09:58 itv-usvr-01 sshd[11067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.32.41.101  user=root
Sep 14 03:10:00 itv-usvr-01 sshd[11067]: Failed password for root from 101.32.41.101 port 34232 ssh2
Sep 14 03:14:28 itv-usvr-01 sshd[11278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.32.41.101  user=root
Sep 14 03:14:29 itv-usvr-01 sshd[11278]: Failed password for root from 101.32.41.101 port 46270 ssh2
Sep 14 03:18:24 itv-usvr-01 sshd[11486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.32.41.101  user=root
Sep 14 03:18:26 itv-usvr-01 sshd[11486]: Failed password for root from 101.32.41.101 port 58304 ssh2
2020-09-14 04:28:23
61.132.233.10 attackspam
2020-09-13T23:22:03.217021mail.standpoint.com.ua sshd[737]: Failed password for invalid user phone from 61.132.233.10 port 14039 ssh2
2020-09-13T23:25:46.124501mail.standpoint.com.ua sshd[1226]: Invalid user catadmin from 61.132.233.10 port 11317
2020-09-13T23:25:46.127301mail.standpoint.com.ua sshd[1226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.132.233.10
2020-09-13T23:25:46.124501mail.standpoint.com.ua sshd[1226]: Invalid user catadmin from 61.132.233.10 port 11317
2020-09-13T23:25:48.446689mail.standpoint.com.ua sshd[1226]: Failed password for invalid user catadmin from 61.132.233.10 port 11317 ssh2
...
2020-09-14 04:27:31
168.63.255.118 attack
20 attempts against mh-ssh on ice
2020-09-14 04:29:11
145.239.85.228 attackspambots
2020-09-14T02:59:32.705388billing sshd[9349]: Failed password for invalid user dcxz from 145.239.85.228 port 35134 ssh2
2020-09-14T03:03:42.697895billing sshd[13777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=vps-c4e73ddf.vps.ovh.net  user=root
2020-09-14T03:03:44.598033billing sshd[13777]: Failed password for root from 145.239.85.228 port 40290 ssh2
...
2020-09-14 04:32:17
198.251.89.86 attack
Sep 13 19:44:54 serwer sshd\[31673\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.251.89.86  user=root
Sep 13 19:44:55 serwer sshd\[31673\]: Failed password for root from 198.251.89.86 port 45480 ssh2
Sep 13 19:45:01 serwer sshd\[31673\]: Failed password for root from 198.251.89.86 port 45480 ssh2
...
2020-09-14 04:21:03

Recently Reported IPs

125.191.8.22 128.199.66.102 195.43.18.89 100.233.117.15
107.207.197.243 49.95.67.181 61.26.239.78 106.54.191.247
52.57.206.66 134.3.12.119 89.66.30.55 12.138.71.55
160.120.248.4 105.218.96.154 176.156.46.188 32.141.152.12
170.130.183.6 209.116.192.12 62.198.120.34 109.162.94.25