Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Gränichen

Region: Aargau

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.138.83.37
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24978
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;91.138.83.37.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 20:48:42 CST 2025
;; MSG SIZE  rcvd: 105
Host info
37.83.138.91.in-addr.arpa domain name pointer 37-83-138-91.dyn.cable.qlnet.ch.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
37.83.138.91.in-addr.arpa	name = 37-83-138-91.dyn.cable.qlnet.ch.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
176.240.173.149 attackspambots
" "
2019-12-03 22:35:33
81.4.106.78 attackspambots
Dec  3 09:30:24 TORMINT sshd\[5205\]: Invalid user glum from 81.4.106.78
Dec  3 09:30:24 TORMINT sshd\[5205\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.4.106.78
Dec  3 09:30:26 TORMINT sshd\[5205\]: Failed password for invalid user glum from 81.4.106.78 port 40216 ssh2
...
2019-12-03 22:47:15
162.244.95.2 attackbotsspam
Wordpress login scanning
2019-12-03 22:02:13
31.0.243.76 attackbots
$f2bV_matches
2019-12-03 22:10:03
35.239.97.162 attackbots
marc-hoffrichter.de:443 35.239.97.162 - - [03/Dec/2019:07:22:10 +0100] "GET / HTTP/2.0" 500 965 "-" "Go-http-client/2.0"
2019-12-03 22:25:25
106.12.34.160 attackbotsspam
Dec  3 14:08:54 MK-Soft-VM6 sshd[15896]: Failed password for backup from 106.12.34.160 port 45748 ssh2
...
2019-12-03 22:06:01
54.39.145.31 attackbots
Dec  3 15:24:51 OPSO sshd\[14655\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.145.31  user=backup
Dec  3 15:24:53 OPSO sshd\[14655\]: Failed password for backup from 54.39.145.31 port 40054 ssh2
Dec  3 15:30:30 OPSO sshd\[15953\]: Invalid user nie from 54.39.145.31 port 50160
Dec  3 15:30:30 OPSO sshd\[15953\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.145.31
Dec  3 15:30:32 OPSO sshd\[15953\]: Failed password for invalid user nie from 54.39.145.31 port 50160 ssh2
2019-12-03 22:37:39
91.185.193.101 attackspambots
Dec  3 13:24:22 arianus sshd\[3842\]: Unable to negotiate with 91.185.193.101 port 36271: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 \[preauth\]
...
2019-12-03 22:25:51
112.85.42.179 attackspam
SSH authentication failure x 6 reported by Fail2Ban
...
2019-12-03 22:06:58
139.198.191.86 attack
Dec  3 14:20:40 raspberrypi sshd\[12015\]: Invalid user derrick from 139.198.191.86Dec  3 14:20:42 raspberrypi sshd\[12015\]: Failed password for invalid user derrick from 139.198.191.86 port 59685 ssh2Dec  3 14:30:27 raspberrypi sshd\[12118\]: Invalid user kienast from 139.198.191.86
...
2019-12-03 22:41:58
47.63.195.94 attackspambots
Automatic report - Port Scan Attack
2019-12-03 22:11:18
110.56.18.86 attackbotsspam
Dec  3 00:59:32 cumulus sshd[28340]: Invalid user ident from 110.56.18.86 port 37284
Dec  3 00:59:32 cumulus sshd[28340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.56.18.86
Dec  3 00:59:33 cumulus sshd[28340]: Failed password for invalid user ident from 110.56.18.86 port 37284 ssh2
Dec  3 00:59:34 cumulus sshd[28340]: Received disconnect from 110.56.18.86 port 37284:11: Bye Bye [preauth]
Dec  3 00:59:34 cumulus sshd[28340]: Disconnected from 110.56.18.86 port 37284 [preauth]
Dec  3 01:08:54 cumulus sshd[28853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.56.18.86  user=nobody
Dec  3 01:08:57 cumulus sshd[28853]: Failed password for nobody from 110.56.18.86 port 47066 ssh2
Dec  3 01:08:57 cumulus sshd[28853]: Received disconnect from 110.56.18.86 port 47066:11: Bye Bye [preauth]
Dec  3 01:08:57 cumulus sshd[28853]: Disconnected from 110.56.18.86 port 47066 [preauth]


........
-------------------------------------
2019-12-03 22:18:59
36.79.42.166 attackspambots
firewall-block, port(s): 1433/tcp
2019-12-03 22:34:06
186.31.37.203 attackspambots
Dec  3 14:11:54 MK-Soft-VM4 sshd[24335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.31.37.203 
Dec  3 14:11:56 MK-Soft-VM4 sshd[24335]: Failed password for invalid user stubbard from 186.31.37.203 port 51379 ssh2
...
2019-12-03 22:07:46
2.188.33.130 attackbots
Automatic report - Port Scan Attack
2019-12-03 22:40:13

Recently Reported IPs

196.130.33.139 231.249.110.224 103.45.90.240 211.27.131.26
103.48.231.82 232.238.21.80 191.223.211.1 235.185.89.94
96.151.44.222 35.181.181.40 20.59.22.1 42.61.99.157
52.18.116.236 179.30.24.253 143.186.3.236 163.146.181.127
235.28.5.98 121.185.171.153 43.201.244.249 39.74.221.189