Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 47.97.34.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56227
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;47.97.34.138.			IN	A

;; AUTHORITY SECTION:
.			293	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 104 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 12:28:45 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 138.34.97.47.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.34.97.47.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.206.245.94 attackbotsspam
Aug 26 18:12:44 rpi sshd[30768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.206.245.94 
Aug 26 18:12:46 rpi sshd[30768]: Failed password for invalid user 1234qwer from 103.206.245.94 port 37658 ssh2
2019-08-27 00:25:45
149.56.44.47 attackbots
Aug 26 04:54:38 web1 sshd\[22916\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.44.47  user=sshd
Aug 26 04:54:40 web1 sshd\[22916\]: Failed password for sshd from 149.56.44.47 port 41108 ssh2
Aug 26 04:54:42 web1 sshd\[22916\]: Failed password for sshd from 149.56.44.47 port 41108 ssh2
Aug 26 04:54:44 web1 sshd\[22916\]: Failed password for sshd from 149.56.44.47 port 41108 ssh2
Aug 26 04:54:47 web1 sshd\[22916\]: Failed password for sshd from 149.56.44.47 port 41108 ssh2
2019-08-26 23:04:50
189.5.193.238 attackspambots
Aug 26 12:29:19 vtv3 sshd\[14171\]: Invalid user spigot from 189.5.193.238 port 33546
Aug 26 12:29:19 vtv3 sshd\[14171\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.5.193.238
Aug 26 12:29:20 vtv3 sshd\[14171\]: Failed password for invalid user spigot from 189.5.193.238 port 33546 ssh2
Aug 26 12:34:46 vtv3 sshd\[17051\]: Invalid user wwwdata from 189.5.193.238 port 54916
Aug 26 12:34:46 vtv3 sshd\[17051\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.5.193.238
Aug 26 12:46:25 vtv3 sshd\[23237\]: Invalid user dev from 189.5.193.238 port 41956
Aug 26 12:46:25 vtv3 sshd\[23237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.5.193.238
Aug 26 12:46:27 vtv3 sshd\[23237\]: Failed password for invalid user dev from 189.5.193.238 port 41956 ssh2
Aug 26 12:52:28 vtv3 sshd\[26311\]: Invalid user syftp from 189.5.193.238 port 34968
Aug 26 12:52:28 vtv3 sshd\[26311\]: pam_u
2019-08-26 23:48:14
51.75.27.254 attackbots
Aug 26 16:57:06 SilenceServices sshd[9806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.27.254
Aug 26 16:57:08 SilenceServices sshd[9806]: Failed password for invalid user beagleindex from 51.75.27.254 port 49902 ssh2
Aug 26 17:01:17 SilenceServices sshd[12109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.27.254
2019-08-26 23:07:45
68.183.204.162 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.204.162
Failed password for invalid user beatriz from 68.183.204.162 port 58890 ssh2
Invalid user ckwan from 68.183.204.162 port 48082
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.204.162
Failed password for invalid user ckwan from 68.183.204.162 port 48082 ssh2
2019-08-26 23:38:56
138.68.57.207 attackbots
[munged]::80 138.68.57.207 - - [26/Aug/2019:16:49:18 +0200] "POST /[munged]: HTTP/1.1" 200 1861 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:61.0.1) Gecko/20120101 Firefox/61.0.1"
2019-08-26 23:11:23
39.152.48.127 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-26 23:46:40
51.91.248.153 attackspam
Aug 26 16:40:01 SilenceServices sshd[2939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.248.153
Aug 26 16:40:03 SilenceServices sshd[2939]: Failed password for invalid user admin from 51.91.248.153 port 57972 ssh2
Aug 26 16:44:06 SilenceServices sshd[4481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.248.153
2019-08-26 22:59:38
23.129.64.215 attack
Aug 26 15:19:44 MK-Soft-VM3 sshd\[6744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.215  user=sshd
Aug 26 15:19:46 MK-Soft-VM3 sshd\[6744\]: Failed password for sshd from 23.129.64.215 port 42631 ssh2
Aug 26 15:19:49 MK-Soft-VM3 sshd\[6744\]: Failed password for sshd from 23.129.64.215 port 42631 ssh2
...
2019-08-26 23:22:40
193.169.255.102 attack
Aug 26 15:52:11 sshgateway sshd\[14147\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.169.255.102  user=sshd
Aug 26 15:52:13 sshgateway sshd\[14147\]: Failed password for sshd from 193.169.255.102 port 35120 ssh2
Aug 26 15:52:13 sshgateway sshd\[14147\]: Failed password for sshd from 193.169.255.102 port 35120 ssh2
2019-08-26 23:55:11
177.19.46.77 attackbots
Automatic report - Port Scan Attack
2019-08-26 23:03:22
87.120.254.98 attackbots
Aug 26 15:58:38 thevastnessof sshd[7892]: Failed password for sshd from 87.120.254.98 port 41217 ssh2
...
2019-08-26 23:59:31
90.253.220.86 attackbotsspam
Aug 26 03:36:59 friendsofhawaii sshd\[891\]: Invalid user admin from 90.253.220.86
Aug 26 03:36:59 friendsofhawaii sshd\[891\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.253.220.86
Aug 26 03:37:01 friendsofhawaii sshd\[891\]: Failed password for invalid user admin from 90.253.220.86 port 39140 ssh2
Aug 26 03:37:04 friendsofhawaii sshd\[891\]: Failed password for invalid user admin from 90.253.220.86 port 39140 ssh2
Aug 26 03:37:07 friendsofhawaii sshd\[891\]: Failed password for invalid user admin from 90.253.220.86 port 39140 ssh2
2019-08-26 23:31:49
162.247.72.199 attackbotsspam
Aug 26 06:14:49 php1 sshd\[3795\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.72.199  user=sshd
Aug 26 06:14:51 php1 sshd\[3795\]: Failed password for sshd from 162.247.72.199 port 46470 ssh2
Aug 26 06:15:01 php1 sshd\[3795\]: Failed password for sshd from 162.247.72.199 port 46470 ssh2
Aug 26 06:15:03 php1 sshd\[3795\]: Failed password for sshd from 162.247.72.199 port 46470 ssh2
Aug 26 06:15:07 php1 sshd\[3901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.72.199  user=sshd
2019-08-27 00:17:32
177.19.255.17 attack
Aug 26 04:02:34 php2 sshd\[29315\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.19.255.17  user=root
Aug 26 04:02:35 php2 sshd\[29315\]: Failed password for root from 177.19.255.17 port 40264 ssh2
Aug 26 04:10:36 php2 sshd\[30582\]: Invalid user zimbra from 177.19.255.17
Aug 26 04:10:36 php2 sshd\[30582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.19.255.17
Aug 26 04:10:38 php2 sshd\[30582\]: Failed password for invalid user zimbra from 177.19.255.17 port 56456 ssh2
2019-08-26 22:52:08

Recently Reported IPs

180.149.126.142 27.187.175.19 86.125.39.106 36.253.18.42
190.97.246.71 115.234.10.208 115.62.172.161 94.63.204.62
187.162.185.134 129.21.240.247 149.90.93.208 94.181.46.182
202.53.141.178 117.251.54.212 117.239.226.94 36.138.142.138
187.162.73.39 52.35.73.7 5.162.130.149 202.191.126.100