Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Valdosta

Region: Georgia

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 38.21.142.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64753
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;38.21.142.169.			IN	A

;; AUTHORITY SECTION:
.			136	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022070102 1800 900 604800 86400

;; Query time: 87 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 02 13:34:45 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 169.142.21.38.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 169.142.21.38.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
80.83.26.23 attack
Automatic report - Port Scan Attack
2019-07-27 11:56:24
185.175.93.105 attackbots
Port scan on 7 port(s): 21700 22500 24400 26600 30902 33502 38802
2019-07-27 11:37:53
196.52.43.103 attack
firewall-block, port(s): 987/tcp
2019-07-27 11:41:05
112.85.42.229 attackbotsspam
Jul 27 09:03:13 areeb-Workstation sshd\[29804\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.229  user=root
Jul 27 09:03:15 areeb-Workstation sshd\[29804\]: Failed password for root from 112.85.42.229 port 34092 ssh2
Jul 27 09:03:53 areeb-Workstation sshd\[29888\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.229  user=root
...
2019-07-27 11:40:32
12.130.138.110 attackspambots
blacklist
2019-07-27 11:37:07
107.155.96.46 attackspam
[Fri Jul 26 09:10:14 2019] [error] [client 107.155.96.46] File does not exist: /home/sfaa/public_html/test
2019-07-27 12:23:46
35.237.32.109 attack
Jul 26 21:49:14 cvbmail sshd\[19940\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.237.32.109  user=root
Jul 26 21:49:16 cvbmail sshd\[19940\]: Failed password for root from 35.237.32.109 port 47268 ssh2
Jul 26 22:03:23 cvbmail sshd\[20048\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.237.32.109  user=root
2019-07-27 11:35:38
90.189.164.195 attackbots
Attempts against Pop3/IMAP
2019-07-27 11:57:29
51.38.231.36 attackbotsspam
Invalid user root1 from 51.38.231.36 port 42792
2019-07-27 11:33:09
190.189.26.81 attack
190.189.26.81 - - [26/Jul/2019:21:39:56 +0200] "GET /wp-login.php HTTP/1.1" 302 573
...
2019-07-27 11:59:19
193.9.246.35 attackspam
[portscan] Port scan
2019-07-27 11:54:33
122.175.55.196 attackbots
Invalid user terrence from 122.175.55.196 port 25031
2019-07-27 12:26:04
51.254.49.108 attackbots
firewall-block, port(s): 3128/tcp
2019-07-27 11:57:56
203.77.234.92 attackbots
Jul 27 05:46:46 bouncer sshd\[18799\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.77.234.92  user=root
Jul 27 05:46:48 bouncer sshd\[18799\]: Failed password for root from 203.77.234.92 port 37602 ssh2
Jul 27 05:51:27 bouncer sshd\[18807\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.77.234.92  user=root
...
2019-07-27 12:33:36
104.248.179.60 attackbots
SSH/22 MH Probe, BF, Hack -
2019-07-27 11:49:55

Recently Reported IPs

218.150.115.165 181.214.250.207 168.195.228.171 72.169.67.17
172.252.224.118 154.201.38.73 222.35.27.123 154.201.47.211
23.94.98.201 23.27.131.118 154.202.101.10 181.215.35.98
38.15.153.214 38.15.152.139 189.105.23.36 154.202.103.226
154.202.103.222 154.201.44.236 191.96.84.228 144.168.148.157