Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Cogent Communications

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 38.21.122.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62314
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;38.21.122.140.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051600 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu May 16 22:02:55 CST 2019
;; MSG SIZE  rcvd: 117

Host info
Host 140.122.21.38.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 140.122.21.38.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
198.108.67.98 attack
05/11/2020-23:54:53.237936 198.108.67.98 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-05-12 12:41:43
118.70.12.171 attack
20/5/11@23:54:39: FAIL: Alarm-Network address from=118.70.12.171
20/5/11@23:54:39: FAIL: Alarm-Network address from=118.70.12.171
...
2020-05-12 12:52:46
209.126.119.148 attackspambots
May 12 06:12:51 OPSO sshd\[20147\]: Invalid user noc from 209.126.119.148 port 52835
May 12 06:12:51 OPSO sshd\[20147\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.126.119.148
May 12 06:12:53 OPSO sshd\[20147\]: Failed password for invalid user noc from 209.126.119.148 port 52835 ssh2
May 12 06:16:20 OPSO sshd\[21407\]: Invalid user tam from 209.126.119.148 port 58281
May 12 06:16:20 OPSO sshd\[21407\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.126.119.148
2020-05-12 12:28:52
112.21.188.235 attack
2020-05-12T05:52:10.018045vps773228.ovh.net sshd[31994]: Invalid user ftp_test from 112.21.188.235 port 36922
2020-05-12T05:52:10.037026vps773228.ovh.net sshd[31994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.21.188.235
2020-05-12T05:52:10.018045vps773228.ovh.net sshd[31994]: Invalid user ftp_test from 112.21.188.235 port 36922
2020-05-12T05:52:12.100913vps773228.ovh.net sshd[31994]: Failed password for invalid user ftp_test from 112.21.188.235 port 36922 ssh2
2020-05-12T05:54:53.979894vps773228.ovh.net sshd[32042]: Invalid user angel1 from 112.21.188.235 port 45844
...
2020-05-12 12:40:11
94.180.58.238 attackbotsspam
May 12 00:47:59 firewall sshd[29857]: Failed password for invalid user apache from 94.180.58.238 port 54302 ssh2
May 12 00:54:42 firewall sshd[30086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.180.58.238  user=root
May 12 00:54:44 firewall sshd[30086]: Failed password for root from 94.180.58.238 port 38920 ssh2
...
2020-05-12 12:49:00
49.88.112.60 attackspambots
Found by fail2ban
2020-05-12 12:41:22
88.98.254.133 attack
May 12 06:07:04 v22019038103785759 sshd\[8135\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.98.254.133  user=root
May 12 06:07:06 v22019038103785759 sshd\[8135\]: Failed password for root from 88.98.254.133 port 36330 ssh2
May 12 06:09:57 v22019038103785759 sshd\[8368\]: Invalid user bbj from 88.98.254.133 port 34806
May 12 06:09:57 v22019038103785759 sshd\[8368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.98.254.133
May 12 06:09:59 v22019038103785759 sshd\[8368\]: Failed password for invalid user bbj from 88.98.254.133 port 34806 ssh2
...
2020-05-12 12:45:02
106.53.12.243 attackbots
Invalid user psg from 106.53.12.243 port 50732
2020-05-12 12:56:03
52.130.93.119 attackbotsspam
SSH Brute-Forcing (server2)
2020-05-12 12:41:07
152.136.106.240 attack
May 12 06:26:14 [host] sshd[4069]: Invalid user te
May 12 06:26:14 [host] sshd[4069]: pam_unix(sshd:a
May 12 06:26:15 [host] sshd[4069]: Failed password
2020-05-12 12:54:14
132.232.32.228 attackbots
2020-05-12T03:51:29.865226shield sshd\[10702\]: Invalid user test from 132.232.32.228 port 39618
2020-05-12T03:51:29.869441shield sshd\[10702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.32.228
2020-05-12T03:51:31.968664shield sshd\[10702\]: Failed password for invalid user test from 132.232.32.228 port 39618 ssh2
2020-05-12T03:55:15.059819shield sshd\[11710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.32.228  user=root
2020-05-12T03:55:16.851890shield sshd\[11710\]: Failed password for root from 132.232.32.228 port 52472 ssh2
2020-05-12 12:22:06
36.111.171.14 attackspambots
ssh brute force
2020-05-12 12:29:51
14.116.208.123 attackbots
Unauthorized IMAP connection attempt
2020-05-12 12:22:57
195.231.3.56 attack
May 12 06:30:40 debian-2gb-nbg1-2 kernel: \[11516704.133391\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=195.231.3.56 DST=195.201.40.59 LEN=40 TOS=0x08 PREC=0x20 TTL=241 ID=54321 PROTO=TCP SPT=41893 DPT=81 WINDOW=65535 RES=0x00 SYN URGP=0
2020-05-12 12:35:10
117.247.226.29 attackspam
May 12 06:47:46 plex sshd[12288]: Invalid user macbackups from 117.247.226.29 port 33992
2020-05-12 12:52:08

Recently Reported IPs

217.166.15.136 129.70.94.203 91.255.211.53 107.170.200.181
113.213.232.6 172.153.72.46 155.124.126.89 68.183.101.166
14.147.18.234 47.63.72.140 111.11.133.71 137.180.207.16
91.207.74.134 189.42.130.167 175.206.14.191 77.242.0.250
173.216.209.55 1.67.107.46 31.207.47.21 152.96.64.135