Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.111.185.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9996
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;214.111.185.138.		IN	A

;; AUTHORITY SECTION:
.			544	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019111201 1800 900 604800 86400

;; Query time: 192 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Nov 13 04:43:43 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 138.185.111.214.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.185.111.214.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
69.88.163.18 attackspambots
Unauthorised access (Oct 16) SRC=69.88.163.18 LEN=40 TTL=243 ID=4148 TCP DPT=139 WINDOW=1024 SYN 
Unauthorised access (Oct 14) SRC=69.88.163.18 LEN=40 TTL=243 ID=54927 TCP DPT=139 WINDOW=1024 SYN
2019-10-16 18:11:08
200.198.51.226 attack
3389BruteforceFW23
2019-10-16 18:21:08
79.137.75.5 attackspambots
Failed password for invalid user 1234 from 79.137.75.5 port 38012 ssh2
Invalid user 1 from 79.137.75.5 port 46152
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.75.5
Failed password for invalid user 1 from 79.137.75.5 port 46152 ssh2
Invalid user enough from 79.137.75.5 port 54226
2019-10-16 18:31:08
121.165.66.226 attackspam
2019-10-16T11:59:23.494866scmdmz1 sshd\[4545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.165.66.226  user=root
2019-10-16T11:59:25.661443scmdmz1 sshd\[4545\]: Failed password for root from 121.165.66.226 port 42336 ssh2
2019-10-16T12:08:45.109227scmdmz1 sshd\[5497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.165.66.226  user=root
...
2019-10-16 18:16:48
115.159.143.217 attackbots
Oct 16 10:43:06 herz-der-gamer sshd[25790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.143.217  user=root
Oct 16 10:43:09 herz-der-gamer sshd[25790]: Failed password for root from 115.159.143.217 port 45159 ssh2
Oct 16 11:04:57 herz-der-gamer sshd[25896]: Invalid user cadman from 115.159.143.217 port 38759
...
2019-10-16 18:03:46
212.112.92.17 attack
C1,WP GET /suche/wp-login.php
2019-10-16 18:26:35
192.241.247.186 attackspam
SSH bruteforce (Triggered fail2ban)
2019-10-16 18:31:31
2402:1f00:8001:106:: attackbotsspam
ENG,WP GET /wp-login.php
2019-10-16 18:24:05
46.101.44.220 attackspambots
Oct 16 05:35:07 OPSO sshd\[20742\]: Invalid user qwe123 from 46.101.44.220 port 49430
Oct 16 05:35:07 OPSO sshd\[20742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.44.220
Oct 16 05:35:09 OPSO sshd\[20742\]: Failed password for invalid user qwe123 from 46.101.44.220 port 49430 ssh2
Oct 16 05:39:13 OPSO sshd\[21249\]: Invalid user idc7899 from 46.101.44.220 port 60398
Oct 16 05:39:13 OPSO sshd\[21249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.44.220
2019-10-16 17:54:00
151.237.53.55 attack
3389BruteforceFW23
2019-10-16 18:24:42
115.127.83.89 attackbots
Unauthorised access (Oct 16) SRC=115.127.83.89 LEN=52 PREC=0x20 TTL=106 ID=1624 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-16 18:30:46
123.206.18.14 attack
Oct 16 11:33:39 vpn01 sshd[3452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.18.14
Oct 16 11:33:41 vpn01 sshd[3452]: Failed password for invalid user tiny from 123.206.18.14 port 39706 ssh2
...
2019-10-16 17:53:28
91.121.87.174 attackbots
Failed password for root from 91.121.87.174 port 49826 ssh2
Invalid user sunzhu from 91.121.87.174 port 60794
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.87.174
Failed password for invalid user sunzhu from 91.121.87.174 port 60794 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.87.174  user=root
2019-10-16 18:06:56
178.128.246.123 attackbots
Oct 15 20:21:47 auw2 sshd\[4714\]: Invalid user client from 178.128.246.123
Oct 15 20:21:47 auw2 sshd\[4714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.246.123
Oct 15 20:21:49 auw2 sshd\[4714\]: Failed password for invalid user client from 178.128.246.123 port 57896 ssh2
Oct 15 20:25:49 auw2 sshd\[5055\]: Invalid user tecnici from 178.128.246.123
Oct 15 20:25:49 auw2 sshd\[5055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.246.123
2019-10-16 18:18:37
110.43.42.244 attackbots
Oct 16 07:32:40 ovpn sshd\[2563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.43.42.244  user=root
Oct 16 07:32:43 ovpn sshd\[2563\]: Failed password for root from 110.43.42.244 port 41210 ssh2
Oct 16 07:50:39 ovpn sshd\[5984\]: Invalid user installer from 110.43.42.244
Oct 16 07:50:39 ovpn sshd\[5984\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.43.42.244
Oct 16 07:50:41 ovpn sshd\[5984\]: Failed password for invalid user installer from 110.43.42.244 port 37818 ssh2
2019-10-16 18:01:39

Recently Reported IPs

188.17.166.121 233.185.96.129 163.171.37.78 185.37.115.83
166.78.41.53 238.85.98.29 205.16.16.20 56.144.141.162
163.212.3.66 183.229.39.139 34.89.192.105 44.211.114.218
205.230.105.171 42.60.109.198 100.33.35.135 115.128.15.130
92.176.92.150 101.72.45.62 137.148.32.68 83.103.66.200