Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 22.230.108.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5103
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;22.230.108.138.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024122001 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 21 04:54:49 CST 2024
;; MSG SIZE  rcvd: 107
Host info
Host 138.108.230.22.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.108.230.22.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
157.230.37.16 attack
Mar 28 08:16:37 debian-2gb-nbg1-2 kernel: \[7638864.953377\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=157.230.37.16 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x40 TTL=242 ID=63122 PROTO=TCP SPT=45995 DPT=12021 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-28 18:35:52
198.108.66.230 attackbots
Port 9961 scan denied
2020-03-28 19:05:04
115.238.107.211 attack
Mar 28 09:01:15 XXXXXX sshd[11573]: Invalid user hpq from 115.238.107.211 port 50162
2020-03-28 19:27:03
104.244.74.151 attack
honeypot 22 port
2020-03-28 18:37:30
176.113.115.43 attackspam
ET DROP Dshield Block Listed Source group 1 - port: 3388 proto: TCP cat: Misc Attack
2020-03-28 19:16:06
31.14.40.194 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 14 - port: 389 proto: UDP cat: Misc Attack
2020-03-28 18:59:32
162.243.129.207 attackspambots
Port 5351 scan denied
2020-03-28 19:19:19
178.128.75.18 attackbots
174 packets to ports 3350 3351 3352 3353 3354 3355 3356 3357 3358 3359 3360 3361 3362 3363 3364 3365 3366 3367 3368 3369 3370 3371 3372 3373 3374 3375 3376 3377 3378 3379 3380 3381 3382 3383 3384 3385 3386 3387 3388 7777 9999
2020-03-28 18:31:05
87.251.74.9 attack
03/28/2020-05:59:43.706662 87.251.74.9 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-03-28 18:44:49
125.64.94.211 attackspambots
Port 28017 scan denied
2020-03-28 19:24:58
92.63.196.7 attack
TCP scanned port list, 3402, 3399, 3400, 3398
2020-03-28 18:40:05
51.83.216.215 attackspambots
Fail2Ban Ban Triggered
2020-03-28 18:53:03
45.143.220.251 attack
Port 43859 scan denied
2020-03-28 18:55:50
54.39.215.32 attackspam
Port 40417 scan denied
2020-03-28 18:51:35
184.105.247.248 attackbotsspam
firewall-block, port(s): 6379/tcp
2020-03-28 19:15:12

Recently Reported IPs

237.2.41.85 172.232.111.51 125.55.13.34 37.74.207.222
233.83.43.70 26.187.244.86 107.166.79.208 142.98.210.14
70.28.249.205 253.115.44.0 184.240.35.45 104.161.180.5
244.225.200.254 94.38.169.115 185.127.29.87 104.209.36.148
72.188.42.32 239.251.212.128 238.76.3.120 229.216.13.60