Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: San José

Region: Provincia de San Jose

Country: Costa Rica

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 201.194.138.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45327
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;201.194.138.69.			IN	A

;; AUTHORITY SECTION:
.			405	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020090101 1800 900 604800 86400

;; Query time: 113 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 02 08:57:27 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 69.138.194.201.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 69.138.194.201.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
176.115.100.201 attackbotsspam
Oct  5 12:57:29 sauna sshd[161824]: Failed password for root from 176.115.100.201 port 33012 ssh2
...
2019-10-05 18:10:17
24.221.18.234 attack
2019-10-05T03:46:47.876734abusebot-8.cloudsearch.cf sshd\[31614\]: Invalid user pi from 24.221.18.234 port 48808
2019-10-05 17:58:53
192.227.136.67 attackbots
$f2bV_matches
2019-10-05 18:31:40
122.96.242.79 attack
2019-10-04T20:45:53.604876suse-nuc sshd[29423]: error: maximum authentication attempts exceeded for root from 122.96.242.79 port 59637 ssh2 [preauth]
...
2019-10-05 18:26:42
115.73.6.106 attackspam
Automatic report - Port Scan Attack
2019-10-05 18:30:19
187.167.67.187 attack
Automatic report - Port Scan Attack
2019-10-05 18:26:07
128.199.253.133 attack
Brute force attempt
2019-10-05 18:35:56
111.198.29.223 attack
Fail2Ban - SSH Bruteforce Attempt
2019-10-05 18:11:42
106.12.176.3 attackbots
Oct  5 11:51:47 MK-Soft-VM6 sshd[8330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.176.3 
Oct  5 11:51:49 MK-Soft-VM6 sshd[8330]: Failed password for invalid user 4rfv$RFV from 106.12.176.3 port 49264 ssh2
...
2019-10-05 18:32:33
45.114.116.101 attack
Brute Force attack - banned by Fail2Ban
2019-10-05 18:07:43
101.99.75.212 attack
WordPress login Brute force / Web App Attack on client site.
2019-10-05 18:03:13
91.236.116.89 attackspam
Oct  5 12:29:33 andromeda sshd\[41823\]: Invalid user admin from 91.236.116.89 port 54580
Oct  5 12:29:33 andromeda sshd\[41823\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.236.116.89
Oct  5 12:29:35 andromeda sshd\[41823\]: Failed password for invalid user admin from 91.236.116.89 port 54580 ssh2
2019-10-05 18:31:20
62.234.128.242 attackspam
Invalid user archiva from 62.234.128.242 port 44119
2019-10-05 17:58:29
46.101.163.220 attackspam
SSH bruteforce (Triggered fail2ban)
2019-10-05 18:05:48
157.55.39.136 attackspambots
Automatic report - Banned IP Access
2019-10-05 18:01:21

Recently Reported IPs

60.96.138.131 94.211.148.62 109.195.212.39 81.228.49.176
154.254.181.17 36.235.48.177 205.124.166.177 27.34.104.73
81.103.133.62 126.80.237.151 97.247.133.121 5.143.133.213
120.226.152.36 85.55.160.135 84.194.156.192 63.114.12.75
171.223.252.165 178.143.152.247 152.32.64.131 160.248.118.30