Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 0.120.138.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28402
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;0.120.138.144.			IN	A

;; AUTHORITY SECTION:
.			233	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019111800 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Nov 18 23:43:07 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 144.138.120.0.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 144.138.120.0.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.175.183 attackspambots
2020-08-07T13:18:47.181611vps1033 sshd[22910]: Failed password for root from 222.186.175.183 port 30756 ssh2
2020-08-07T13:18:50.548265vps1033 sshd[22910]: Failed password for root from 222.186.175.183 port 30756 ssh2
2020-08-07T13:18:53.660293vps1033 sshd[22910]: Failed password for root from 222.186.175.183 port 30756 ssh2
2020-08-07T13:18:57.190383vps1033 sshd[22910]: Failed password for root from 222.186.175.183 port 30756 ssh2
2020-08-07T13:19:00.598237vps1033 sshd[22910]: Failed password for root from 222.186.175.183 port 30756 ssh2
...
2020-08-07 21:35:53
80.69.161.131 attack
This client attempted to login to an administrator account on a Website, or abused from another resource.
2020-08-07 21:33:36
221.151.207.173 attackspam
Aug  7 14:07:18 debian-2gb-nbg1-2 kernel: \[19060489.236994\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=221.151.207.173 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=238 ID=4141 DF PROTO=TCP SPT=40982 DPT=23 WINDOW=14600 RES=0x00 SYN URGP=0
2020-08-07 21:49:50
185.53.97.59 attack
SS5,WP GET //wp-login.php
GET /blog//wp-login.php
GET /wordpress//wp-login.php
GET /wp//wp-login.php
2020-08-07 21:32:51
221.163.8.108 attackbots
k+ssh-bruteforce
2020-08-07 21:29:22
211.57.153.250 attackbots
SSH brutforce
2020-08-07 21:34:54
162.214.28.25 attack
162.214.28.25 - - [07/Aug/2020:14:10:32 +0100] "POST /wp-login.php HTTP/1.1" 200 1908 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
162.214.28.25 - - [07/Aug/2020:14:10:35 +0100] "POST /wp-login.php HTTP/1.1" 200 1839 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
162.214.28.25 - - [07/Aug/2020:14:10:36 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-07 21:35:14
222.186.42.213 attack
Aug  7 15:51:37 theomazars sshd[12839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.213  user=root
Aug  7 15:51:40 theomazars sshd[12839]: Failed password for root from 222.186.42.213 port 32102 ssh2
2020-08-07 21:54:30
50.4.86.76 attackspam
(sshd) Failed SSH login from 50.4.86.76 (US/United States/d4-50-76-86.nap.wideopenwest.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug  7 13:46:51 grace sshd[16179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.4.86.76  user=root
Aug  7 13:46:53 grace sshd[16179]: Failed password for root from 50.4.86.76 port 47320 ssh2
Aug  7 14:03:11 grace sshd[18145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.4.86.76  user=root
Aug  7 14:03:13 grace sshd[18145]: Failed password for root from 50.4.86.76 port 48902 ssh2
Aug  7 14:07:12 grace sshd[18869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.4.86.76  user=root
2020-08-07 21:56:47
218.92.0.158 attack
Aug  7 15:47:44 vps1 sshd[22971]: Failed none for invalid user root from 218.92.0.158 port 9418 ssh2
Aug  7 15:47:45 vps1 sshd[22971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.158  user=root
Aug  7 15:47:46 vps1 sshd[22971]: Failed password for invalid user root from 218.92.0.158 port 9418 ssh2
Aug  7 15:47:50 vps1 sshd[22971]: Failed password for invalid user root from 218.92.0.158 port 9418 ssh2
Aug  7 15:47:54 vps1 sshd[22971]: Failed password for invalid user root from 218.92.0.158 port 9418 ssh2
Aug  7 15:47:57 vps1 sshd[22971]: Failed password for invalid user root from 218.92.0.158 port 9418 ssh2
Aug  7 15:48:01 vps1 sshd[22971]: Failed password for invalid user root from 218.92.0.158 port 9418 ssh2
Aug  7 15:48:03 vps1 sshd[22971]: error: maximum authentication attempts exceeded for invalid user root from 218.92.0.158 port 9418 ssh2 [preauth]
...
2020-08-07 21:58:20
165.227.45.249 attack
Aug  7 14:28:02 rocket sshd[24196]: Failed password for root from 165.227.45.249 port 53174 ssh2
Aug  7 14:33:41 rocket sshd[24947]: Failed password for root from 165.227.45.249 port 36682 ssh2
...
2020-08-07 21:45:43
45.14.224.143 attackbots
Aug  7 16:16:40 mertcangokgoz-v4-main kernel: [423135.458822] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:5a:6b:04:d2:74:7f:6e:37:e3:08:00 SRC=45.14.224.143 DST=94.130.96.165 LEN=40 TOS=0x00 PREC=0x00 TTL=55 ID=17758 PROTO=TCP SPT=31924 DPT=8080 WINDOW=41045 RES=0x00 SYN URGP=0
2020-08-07 21:37:17
188.166.144.207 attackspam
Aug  7 03:02:17 web9 sshd\[3283\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.144.207  user=root
Aug  7 03:02:19 web9 sshd\[3283\]: Failed password for root from 188.166.144.207 port 54668 ssh2
Aug  7 03:06:38 web9 sshd\[4124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.144.207  user=root
Aug  7 03:06:40 web9 sshd\[4124\]: Failed password for root from 188.166.144.207 port 37576 ssh2
Aug  7 03:10:56 web9 sshd\[4685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.144.207  user=root
2020-08-07 21:29:55
51.15.108.244 attackbotsspam
SSH brute-force attempt
2020-08-07 21:48:54
194.180.224.103 attackspam
Aug  7 **REMOVED** sshd\[31233\]: Invalid user user from 194.180.224.103
Aug  7 **REMOVED** sshd\[31235\]: Invalid user git from 194.180.224.103
Aug  7 **REMOVED** sshd\[31237\]: Invalid user postgres from 194.180.224.103
2020-08-07 22:09:59

Recently Reported IPs

66.70.240.2 219.92.249.9 91.121.157.1 39.105.183.1
191.254.105.9 173.212.229.2 207.183.165.2 202.69.38.4
186.42.224.1 177.52.118.0 123.243.103.1 45.132.38.96
85.113.58.1 205.161.231.3 79.143.188.1 45.148.10.184
5.38.216.2 200.194.30.8 186.216.81.2 178.93.58.1