Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Echo

Region: Oregon

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 98.142.41.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29934
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;98.142.41.138.			IN	A

;; AUTHORITY SECTION:
.			491	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020090801 1800 900 604800 86400

;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 09 08:14:50 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 138.41.142.98.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		100.100.2.138
Address:	100.100.2.138#53

** server can't find 138.41.142.98.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
103.74.239.110 attackspam
Invalid user www from 103.74.239.110 port 53836
2020-07-12 01:25:38
182.61.61.86 attackbotsspam
Invalid user vpopmail from 182.61.61.86 port 34514
2020-07-12 01:08:13
139.198.120.221 attack
$f2bV_matches
2020-07-12 01:17:19
181.40.122.2 attackbots
frenzy
2020-07-12 01:09:15
117.158.56.11 attack
Jul 11 19:00:17 srv sshd[23360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.158.56.11
2020-07-12 01:21:46
5.56.58.28 attackspambots
Jul 11 17:18:10 scw-6657dc sshd[19671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.56.58.28
Jul 11 17:18:10 scw-6657dc sshd[19671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.56.58.28
Jul 11 17:18:12 scw-6657dc sshd[19671]: Failed password for invalid user cherish from 5.56.58.28 port 34519 ssh2
...
2020-07-12 01:35:29
140.143.3.28 attackspam
Invalid user liangbin from 140.143.3.28 port 54182
2020-07-12 01:16:34
139.155.17.13 attackspam
Invalid user calin from 139.155.17.13 port 57342
2020-07-12 01:17:52
182.253.68.122 attack
Jul 11 16:07:19 hosting sshd[12468]: Invalid user joanna from 182.253.68.122 port 60640
...
2020-07-12 01:07:57
122.51.34.199 attack
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth):
2020-07-12 01:20:58
188.226.202.13 attackspambots
Jul 11 23:58:06 itv-usvr-01 sshd[32003]: Invalid user office from 188.226.202.13
Jul 11 23:58:06 itv-usvr-01 sshd[32003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.226.202.13
Jul 11 23:58:06 itv-usvr-01 sshd[32003]: Invalid user office from 188.226.202.13
Jul 11 23:58:08 itv-usvr-01 sshd[32003]: Failed password for invalid user office from 188.226.202.13 port 44055 ssh2
Jul 12 00:02:27 itv-usvr-01 sshd[32169]: Invalid user rosanna from 188.226.202.13
2020-07-12 01:05:58
172.245.180.180 attackbots
" "
2020-07-12 01:11:52
177.242.46.46 attackspambots
Invalid user jeff from 177.242.46.46 port 38338
2020-07-12 01:10:55
106.3.130.53 attack
Invalid user sharan from 106.3.130.53 port 49628
2020-07-12 01:24:14
180.76.148.87 attackspambots
Invalid user xidian from 180.76.148.87 port 33946
2020-07-12 01:10:21

Recently Reported IPs

27.208.176.230 117.223.9.190 130.43.187.142 79.212.132.36
83.87.45.41 85.140.1.230 151.209.107.214 74.171.124.109
59.40.214.82 115.160.157.18 64.238.145.153 98.103.105.222
39.3.4.124 63.74.57.132 102.75.2.251 165.22.49.219
213.11.220.5 95.252.42.237 94.248.101.152 190.109.76.96