Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Stavropol

Region: Stavropol’ Kray

Country: Russia

Internet Service Provider: Rostelecom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.138.8.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57686
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;5.138.8.137.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020070100 1800 900 604800 86400

;; Query time: 116 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jul 01 08:36:41 CST 2020
;; MSG SIZE  rcvd: 115
Host info
Host 137.8.138.5.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 100.100.2.138, trying next server
;; Got SERVFAIL reply from 100.100.2.138, trying next server
Server:		100.100.2.136
Address:	100.100.2.136#53

** server can't find 137.8.138.5.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
222.186.180.6 attackspam
2019-12-16T08:09:04.8021371240 sshd\[17344\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.6  user=root
2019-12-16T08:09:06.8707141240 sshd\[17344\]: Failed password for root from 222.186.180.6 port 29156 ssh2
2019-12-16T08:09:10.3802721240 sshd\[17344\]: Failed password for root from 222.186.180.6 port 29156 ssh2
...
2019-12-16 15:10:43
223.247.194.119 attackspambots
Tried sshing with brute force.
2019-12-16 15:40:17
125.26.95.254 attackspam
Host Scan
2019-12-16 15:11:40
218.92.0.157 attack
Dec 16 07:59:45 dedicated sshd[7235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.157  user=root
Dec 16 07:59:47 dedicated sshd[7235]: Failed password for root from 218.92.0.157 port 37949 ssh2
2019-12-16 15:03:24
79.148.100.106 attackspam
Automatic report - Port Scan Attack
2019-12-16 15:01:36
85.113.136.31 attackbotsspam
DATE:2019-12-16 07:29:35, IP:85.113.136.31, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc)
2019-12-16 15:23:02
149.202.206.206 attack
Dec 15 20:57:31 wbs sshd\[10319\]: Invalid user backes from 149.202.206.206
Dec 15 20:57:31 wbs sshd\[10319\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3034894.ip-149-202-206.eu
Dec 15 20:57:34 wbs sshd\[10319\]: Failed password for invalid user backes from 149.202.206.206 port 59892 ssh2
Dec 15 21:03:11 wbs sshd\[10852\]: Invalid user kunjira from 149.202.206.206
Dec 15 21:03:11 wbs sshd\[10852\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3034894.ip-149-202-206.eu
2019-12-16 15:14:14
171.34.173.49 attackbotsspam
Dec 16 07:19:28 pornomens sshd\[20830\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.34.173.49  user=root
Dec 16 07:19:30 pornomens sshd\[20830\]: Failed password for root from 171.34.173.49 port 60887 ssh2
Dec 16 07:29:13 pornomens sshd\[20927\]: Invalid user gowith from 171.34.173.49 port 42249
Dec 16 07:29:13 pornomens sshd\[20927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.34.173.49
...
2019-12-16 15:42:37
125.212.128.230 attackbots
Unauthorized connection attempt detected from IP address 125.212.128.230 to port 445
2019-12-16 15:25:04
222.186.180.147 attack
Dec 16 02:22:53 mail sshd\[37240\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.147  user=root
...
2019-12-16 15:29:59
218.92.0.148 attack
Dec 15 21:42:10 tdfoods sshd\[25785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.148  user=root
Dec 15 21:42:12 tdfoods sshd\[25785\]: Failed password for root from 218.92.0.148 port 9661 ssh2
Dec 15 21:42:29 tdfoods sshd\[25803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.148  user=root
Dec 15 21:42:32 tdfoods sshd\[25803\]: Failed password for root from 218.92.0.148 port 34229 ssh2
Dec 15 21:42:35 tdfoods sshd\[25803\]: Failed password for root from 218.92.0.148 port 34229 ssh2
2019-12-16 15:43:48
198.108.67.79 attackbots
Fail2Ban Ban Triggered
2019-12-16 15:35:53
111.198.72.83 attackbots
Fail2Ban - FTP Abuse Attempt
2019-12-16 15:32:27
200.87.178.137 attackspambots
Dec 16 08:11:21 lnxweb62 sshd[2208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.87.178.137
Dec 16 08:11:21 lnxweb62 sshd[2208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.87.178.137
2019-12-16 15:29:09
203.162.230.150 attack
Dec 16 07:23:27 vpn01 sshd[4214]: Failed password for root from 203.162.230.150 port 37693 ssh2
...
2019-12-16 15:23:40

Recently Reported IPs

165.60.150.111 166.200.141.159 192.241.72.17 181.13.10.4
50.106.36.213 97.233.186.46 77.142.248.168 101.102.170.112
86.225.108.200 187.49.92.69 122.161.25.184 14.239.164.247
37.154.228.211 197.178.165.159 160.99.134.243 49.147.152.215
191.248.37.38 115.208.19.189 106.9.225.82 93.239.226.67