Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 224.92.2.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54242
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;224.92.2.138.			IN	A

;; AUTHORITY SECTION:
.			314	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030601 1800 900 604800 86400

;; Query time: 173 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 07 05:21:08 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 138.2.92.224.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.2.92.224.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
80.211.56.72 attack
2020-04-19T12:17:41.870840shield sshd\[13610\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.56.72  user=root
2020-04-19T12:17:43.567538shield sshd\[13610\]: Failed password for root from 80.211.56.72 port 52426 ssh2
2020-04-19T12:23:40.701423shield sshd\[14633\]: Invalid user ubuntu from 80.211.56.72 port 43058
2020-04-19T12:23:40.705937shield sshd\[14633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.56.72
2020-04-19T12:23:43.019859shield sshd\[14633\]: Failed password for invalid user ubuntu from 80.211.56.72 port 43058 ssh2
2020-04-19 20:24:12
218.92.0.203 attackspambots
2020-04-19T11:56:28.578965abusebot-8.cloudsearch.cf sshd[19239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.203  user=root
2020-04-19T11:56:30.516932abusebot-8.cloudsearch.cf sshd[19239]: Failed password for root from 218.92.0.203 port 38352 ssh2
2020-04-19T11:56:32.739937abusebot-8.cloudsearch.cf sshd[19239]: Failed password for root from 218.92.0.203 port 38352 ssh2
2020-04-19T11:56:28.578965abusebot-8.cloudsearch.cf sshd[19239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.203  user=root
2020-04-19T11:56:30.516932abusebot-8.cloudsearch.cf sshd[19239]: Failed password for root from 218.92.0.203 port 38352 ssh2
2020-04-19T11:56:32.739937abusebot-8.cloudsearch.cf sshd[19239]: Failed password for root from 218.92.0.203 port 38352 ssh2
2020-04-19T11:56:28.578965abusebot-8.cloudsearch.cf sshd[19239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rho
...
2020-04-19 20:21:58
178.128.42.105 attackspam
(sshd) Failed SSH login from 178.128.42.105 (GB/United Kingdom/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 19 14:04:30 amsweb01 sshd[12799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.42.105  user=root
Apr 19 14:04:32 amsweb01 sshd[12799]: Failed password for root from 178.128.42.105 port 36028 ssh2
Apr 19 14:08:43 amsweb01 sshd[13330]: Invalid user git from 178.128.42.105 port 57560
Apr 19 14:08:45 amsweb01 sshd[13330]: Failed password for invalid user git from 178.128.42.105 port 57560 ssh2
Apr 19 14:12:50 amsweb01 sshd[13970]: Invalid user git from 178.128.42.105 port 47964
2020-04-19 20:17:43
61.92.168.2 attackspambots
$f2bV_matches
2020-04-19 20:12:16
134.122.124.193 attackbots
web-1 [ssh] SSH Attack
2020-04-19 20:31:58
45.143.223.15 attack
Apr 19 12:05:51 nopemail postfix/smtpd[7136]: NOQUEUE: reject: RCPT from unknown[45.143.223.15]: 554 5.7.1 : Relay access denied; from= to= proto=ESMTP helo=
...
2020-04-19 20:25:40
121.229.13.181 attackspam
2020-04-19T02:54:58.7115521495-001 sshd[22986]: Failed password for operator from 121.229.13.181 port 53318 ssh2
2020-04-19T02:57:32.3007621495-001 sshd[23132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.229.13.181  user=root
2020-04-19T02:57:33.6038071495-001 sshd[23132]: Failed password for root from 121.229.13.181 port 41344 ssh2
2020-04-19T02:59:57.3111561495-001 sshd[23287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.229.13.181  user=root
2020-04-19T02:59:58.8537121495-001 sshd[23287]: Failed password for root from 121.229.13.181 port 57604 ssh2
2020-04-19T03:02:18.6580971495-001 sshd[23442]: Invalid user lc from 121.229.13.181 port 45630
...
2020-04-19 20:09:18
222.186.42.137 attack
04/19/2020-08:39:44.347194 222.186.42.137 Protocol: 6 ET SCAN Potential SSH Scan
2020-04-19 20:40:31
201.226.239.98 attackspam
2020-04-19T13:59:45.202497struts4.enskede.local sshd\[17661\]: Invalid user sf from 201.226.239.98 port 49150
2020-04-19T13:59:45.208929struts4.enskede.local sshd\[17661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=r1.up.ac.pa
2020-04-19T13:59:48.847808struts4.enskede.local sshd\[17661\]: Failed password for invalid user sf from 201.226.239.98 port 49150 ssh2
2020-04-19T14:06:03.462714struts4.enskede.local sshd\[17812\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=r1.up.ac.pa  user=root
2020-04-19T14:06:07.274006struts4.enskede.local sshd\[17812\]: Failed password for root from 201.226.239.98 port 29222 ssh2
...
2020-04-19 20:12:34
24.185.47.170 attackbots
SSH brute force attempt
2020-04-19 20:16:57
46.242.122.111 attack
20/4/19@08:06:03: FAIL: Alarm-Network address from=46.242.122.111
20/4/19@08:06:03: FAIL: Alarm-Network address from=46.242.122.111
...
2020-04-19 20:16:43
34.80.153.175 attackspambots
Lines containing failures of 34.80.153.175 (max 1000)
Apr 19 06:19:23 archiv sshd[25084]: Invalid user ubuntu from 34.80.153.175 port 60810
Apr 19 06:19:25 archiv sshd[25084]: Failed password for invalid user ubuntu from 34.80.153.175 port 60810 ssh2
Apr 19 06:19:26 archiv sshd[25084]: Received disconnect from 34.80.153.175 port 60810:11: Bye Bye [preauth]
Apr 19 06:19:26 archiv sshd[25084]: Disconnected from 34.80.153.175 port 60810 [preauth]
Apr 19 06:37:16 archiv sshd[25442]: Failed password for r.r from 34.80.153.175 port 34086 ssh2
Apr 19 06:37:17 archiv sshd[25442]: Received disconnect from 34.80.153.175 port 34086:11: Bye Bye [preauth]
Apr 19 06:37:17 archiv sshd[25442]: Disconnected from 34.80.153.175 port 34086 [preauth]
Apr 19 06:50:58 archiv sshd[25794]: Invalid user rm from 34.80.153.175 port 53626
Apr 19 06:51:01 archiv sshd[25794]: Failed password for invalid user rm from 34.80.153.175 port 53626 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.htm
2020-04-19 20:21:05
139.59.43.6 attackspam
(sshd) Failed SSH login from 139.59.43.6 (IN/India/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 19 12:28:36 srv sshd[26625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.43.6  user=root
Apr 19 12:28:38 srv sshd[26625]: Failed password for root from 139.59.43.6 port 45636 ssh2
Apr 19 12:34:37 srv sshd[26793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.43.6  user=root
Apr 19 12:34:39 srv sshd[26793]: Failed password for root from 139.59.43.6 port 38394 ssh2
Apr 19 12:40:18 srv sshd[27028]: Invalid user test from 139.59.43.6 port 54816
2020-04-19 20:01:28
67.205.142.246 attackbots
Apr 19 13:32:09 pkdns2 sshd\[38304\]: Invalid user git from 67.205.142.246Apr 19 13:32:11 pkdns2 sshd\[38304\]: Failed password for invalid user git from 67.205.142.246 port 44930 ssh2Apr 19 13:36:58 pkdns2 sshd\[38526\]: Invalid user rstudio from 67.205.142.246Apr 19 13:36:59 pkdns2 sshd\[38526\]: Failed password for invalid user rstudio from 67.205.142.246 port 35310 ssh2Apr 19 13:41:37 pkdns2 sshd\[38758\]: Invalid user ew from 67.205.142.246Apr 19 13:41:39 pkdns2 sshd\[38758\]: Failed password for invalid user ew from 67.205.142.246 port 53922 ssh2
...
2020-04-19 20:05:22
111.230.140.177 attackbotsspam
Apr 19 04:58:26 mockhub sshd[23053]: Failed password for root from 111.230.140.177 port 35358 ssh2
...
2020-04-19 20:25:23

Recently Reported IPs

243.137.181.212 228.254.188.37 48.224.161.155 80.201.123.177
7.167.77.92 210.58.240.136 160.198.229.9 75.12.45.48
3.253.57.231 88.231.26.225 136.197.122.13 249.124.103.63
176.105.200.187 116.203.151.63 134.123.219.159 194.202.191.209
89.66.1.94 225.116.150.130 194.179.210.161 218.94.169.249