Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Slovakia (SLOVAK Republic)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.197.7.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33973
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;212.197.7.138.			IN	A

;; AUTHORITY SECTION:
.			478	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020100301 1800 900 604800 86400

;; Query time: 95 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 04 17:08:30 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 138.7.197.212.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.7.197.212.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
191.253.110.171 attackbots
Attempt to login to email server on SMTP service on 25-08-2019 19:51:29.
2019-08-26 04:19:36
189.112.216.161 attackspam
failed_logins
2019-08-26 04:20:19
41.71.98.53 attackbotsspam
Aug 25 20:59:05 debian sshd\[18777\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.71.98.53  user=root
Aug 25 20:59:07 debian sshd\[18777\]: Failed password for root from 41.71.98.53 port 37614 ssh2
...
2019-08-26 04:06:04
77.40.91.184 attack
2019-08-25T20:44:45.167114mail01 postfix/smtpd[11680]: warning: unknown[77.40.91.184]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-08-25T20:49:45.469858mail01 postfix/smtpd[20097]: warning: unknown[77.40.91.184]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-08-25T20:50:40.464836mail01 postfix/smtpd[20097]: warning: unknown[77.40.91.184]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-08-26 04:44:56
43.231.61.147 attackspam
$f2bV_matches
2019-08-26 04:10:08
212.87.9.155 attackbots
Failed password for invalid user altered from 212.87.9.155 port 45284 ssh2
Invalid user jean from 212.87.9.155 port 33782
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.87.9.155
Failed password for invalid user jean from 212.87.9.155 port 33782 ssh2
Invalid user lg from 212.87.9.155 port 50522
2019-08-26 04:38:17
51.38.234.224 attack
Aug 25 22:37:06 SilenceServices sshd[30749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.234.224
Aug 25 22:37:08 SilenceServices sshd[30749]: Failed password for invalid user test from 51.38.234.224 port 52656 ssh2
Aug 25 22:41:02 SilenceServices sshd[32376]: Failed password for root from 51.38.234.224 port 41142 ssh2
2019-08-26 04:42:33
178.85.152.250 attack
$f2bV_matches
2019-08-26 04:13:29
106.12.78.199 attackbotsspam
2019-08-25T20:49:43.264478abusebot-6.cloudsearch.cf sshd\[15062\]: Invalid user willshao from 106.12.78.199 port 53356
2019-08-26 04:58:42
108.62.202.220 attackspam
Splunk® : port scan detected:
Aug 25 16:40:39 testbed kernel: Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=82:c6:52:d1:6e:53:64:c3:d6:0b:ef:f0:08:00 SRC=108.62.202.220 DST=104.248.11.191 LEN=40 TOS=0x08 PREC=0x20 TTL=244 ID=54321 PROTO=TCP SPT=56224 DPT=29873 WINDOW=65535 RES=0x00 SYN URGP=0
2019-08-26 04:51:46
49.68.105.224 attackbots
Unauthorised access (Aug 25) SRC=49.68.105.224 LEN=40 TTL=48 ID=5607 TCP DPT=8080 WINDOW=42025 SYN
2019-08-26 04:38:56
125.16.123.162 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-25 14:19:08,758 INFO [shellcode_manager] (125.16.123.162) no match, writing hexdump (6e29ec0bdf209a4bd67f189dcc728691 :16741) - SMB (Unknown)
2019-08-26 04:51:21
89.142.32.116 attackbotsspam
C1,WP GET /nelson/wp-login.php
2019-08-26 04:50:27
45.55.12.248 attackspambots
Aug 25 09:46:51 lcprod sshd\[19064\]: Invalid user gts from 45.55.12.248
Aug 25 09:46:51 lcprod sshd\[19064\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.12.248
Aug 25 09:46:53 lcprod sshd\[19064\]: Failed password for invalid user gts from 45.55.12.248 port 42664 ssh2
Aug 25 09:51:23 lcprod sshd\[19451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.12.248  user=sshd
Aug 25 09:51:25 lcprod sshd\[19451\]: Failed password for sshd from 45.55.12.248 port 57972 ssh2
2019-08-26 04:06:24
115.159.86.75 attackbots
Aug 25 09:48:19 hiderm sshd\[14476\]: Invalid user natasa from 115.159.86.75
Aug 25 09:48:19 hiderm sshd\[14476\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.86.75
Aug 25 09:48:21 hiderm sshd\[14476\]: Failed password for invalid user natasa from 115.159.86.75 port 48864 ssh2
Aug 25 09:51:39 hiderm sshd\[14749\]: Invalid user salman from 115.159.86.75
Aug 25 09:51:39 hiderm sshd\[14749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.86.75
2019-08-26 04:54:24

Recently Reported IPs

212.132.224.44 23.94.160.28 148.230.115.56 138.13.160.190
232.216.108.120 164.255.29.95 169.190.136.81 218.154.59.102
111.207.1.151 37.72.190.176 13.49.145.182 121.9.211.84
5.157.26.230 220.135.50.93 185.36.160.18 174.156.24.17
59.40.83.121 188.166.223.76 188.166.82.57 153.99.181.90