Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.138.82.173
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56539
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.138.82.173.			IN	A

;; AUTHORITY SECTION:
.			553	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 21:04:32 CST 2022
;; MSG SIZE  rcvd: 105
Host info
173.82.138.5.in-addr.arpa domain name pointer host-5-138-82-173.stavropol.ru.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
173.82.138.5.in-addr.arpa	name = host-5-138-82-173.stavropol.ru.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.234.207.226 attackspam
2020-06-06T22:36:27.992944vps773228.ovh.net sshd[4659]: Failed password for root from 49.234.207.226 port 58126 ssh2
2020-06-06T22:39:39.218723vps773228.ovh.net sshd[4709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.207.226  user=root
2020-06-06T22:39:40.920682vps773228.ovh.net sshd[4709]: Failed password for root from 49.234.207.226 port 55682 ssh2
2020-06-06T22:42:49.869149vps773228.ovh.net sshd[4767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.207.226  user=root
2020-06-06T22:42:51.987659vps773228.ovh.net sshd[4767]: Failed password for root from 49.234.207.226 port 53238 ssh2
...
2020-06-07 07:58:17
40.120.54.164 attackspambots
frenzy
2020-06-07 07:41:02
78.128.113.42 attackbots
Multiport scan : 45 ports scanned 1141 1221 2068 2130 2228 2240 2244 2512 2569 2622 2649 2688 2860 2951 3001 3217 3251 3300 3314 3357 3406 3490 3578 3588 3689 3733 3750 3768 3839 3841 3988 4009 4309 4331 4410 4414 4502 4570 4582 4587 4743 4919 5315 5511 5566
2020-06-07 07:25:31
185.200.118.47 attack
 UDP 185.200.118.47:37949 -> port 1194, len 42
2020-06-07 07:55:56
123.20.38.43 attackspam
Email rejected due to spam filtering
2020-06-07 07:46:45
123.207.62.31 attackspambots
Jun  6 22:46:07 vps639187 sshd\[16938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.62.31  user=root
Jun  6 22:46:09 vps639187 sshd\[16938\]: Failed password for root from 123.207.62.31 port 39154 ssh2
Jun  6 22:47:05 vps639187 sshd\[16962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.62.31  user=root
...
2020-06-07 07:28:56
94.130.149.34 attackspambots
 TCP (SYN) 94.130.149.34:54855 -> port 23, len 40
2020-06-07 08:00:47
69.94.235.219 attack
fail2ban -- 69.94.235.219
...
2020-06-07 07:57:30
187.162.247.136 attackspambots
port
2020-06-07 07:51:54
60.2.10.86 attackspambots
Jun  6 22:31:38 prox sshd[9987]: Failed password for root from 60.2.10.86 port 35859 ssh2
2020-06-07 07:40:50
152.32.91.185 attackspambots
1591476196 - 06/06/2020 22:43:16 Host: 152.32.91.185/152.32.91.185 Port: 445 TCP Blocked
2020-06-07 07:38:14
65.191.76.227 attackspambots
$f2bV_matches
2020-06-07 07:37:19
89.248.174.193 attack
port
2020-06-07 07:22:08
51.15.214.221 attackbots
$f2bV_matches
2020-06-07 07:56:42
201.62.66.22 attack
Brute force attempt
2020-06-07 07:22:40

Recently Reported IPs

201.226.51.140 118.179.157.242 189.213.141.194 193.233.231.18
185.108.106.75 183.150.81.139 58.215.218.170 49.69.209.217
47.96.147.39 144.217.236.50 178.72.75.28 112.32.173.231
188.163.73.165 174.138.116.12 66.191.171.137 39.90.151.139
46.8.33.102 120.234.149.225 222.210.55.109 110.34.75.72