Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 100.149.138.36
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54271
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;100.149.138.36.			IN	A

;; AUTHORITY SECTION:
.			478	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019102101 1800 900 604800 86400

;; Query time: 100 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 22 12:07:34 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 36.138.149.100.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 36.138.149.100.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
34.73.39.215 attackbotsspam
Jan  2 17:27:15 [host] sshd[21378]: Invalid user rylea from 34.73.39.215
Jan  2 17:27:15 [host] sshd[21378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.73.39.215
Jan  2 17:27:16 [host] sshd[21378]: Failed password for invalid user rylea from 34.73.39.215 port 53444 ssh2
2020-01-03 01:55:09
200.196.140.6 attackbotsspam
web Attack on Website at 2020-01-02.
2020-01-03 01:34:25
36.90.89.154 attackspambots
1577976962 - 01/02/2020 15:56:02 Host: 36.90.89.154/36.90.89.154 Port: 445 TCP Blocked
2020-01-03 01:51:23
198.199.97.155 attack
SSH invalid-user multiple login try
2020-01-03 01:56:22
209.105.243.1 attackspam
SSH login attempts with user root at 2020-01-02.
2020-01-03 01:24:23
186.147.237.51 attackbots
Jan  2 18:05:21 legacy sshd[29791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.147.237.51
Jan  2 18:05:23 legacy sshd[29791]: Failed password for invalid user admin from 186.147.237.51 port 39060 ssh2
Jan  2 18:08:49 legacy sshd[29941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.147.237.51
...
2020-01-03 01:35:30
106.10.242.139 attackbots
SMTP REDIRECT
2020-01-03 01:50:57
182.61.36.38 attack
Jan  2 17:12:22 pi sshd\[9868\]: Invalid user karras from 182.61.36.38 port 50822
Jan  2 17:12:22 pi sshd\[9868\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.36.38
Jan  2 17:12:24 pi sshd\[9868\]: Failed password for invalid user karras from 182.61.36.38 port 50822 ssh2
Jan  2 17:33:37 pi sshd\[10351\]: Invalid user server from 182.61.36.38 port 41022
Jan  2 17:33:37 pi sshd\[10351\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.36.38
...
2020-01-03 01:47:06
220.120.106.2 attackbots
SSH login attempts with user root at 2020-01-02.
2020-01-03 01:19:58
190.187.104.1 attackbots
SSH login attempts with user root at 2020-01-02.
2020-01-03 01:45:55
182.254.227.1 attack
SSH login attempts with user root at 2020-01-02.
2020-01-03 02:01:42
220.76.107.50 attackspambots
Invalid user stallcup from 220.76.107.50 port 46478
2020-01-03 01:22:59
129.211.76.101 attack
Jan  2 15:56:51 *** sshd[14187]: Invalid user ching from 129.211.76.101
2020-01-03 01:53:15
185.187.48.6 attackspam
web Attack on Website at 2020-01-02.
2020-01-03 01:58:17
212.64.127.1 attack
SSH login attempts with user root at 2020-01-02.
2020-01-03 01:23:32

Recently Reported IPs

153.13.230.70 252.248.235.208 255.3.163.11 25.183.170.246
170.239.24.243 90.104.244.92 181.158.214.41 29.209.23.43
45.203.97.58 211.247.190.189 148.28.18.72 235.18.66.51
215.189.226.119 21.82.211.86 122.118.50.12 113.7.196.40
239.70.10.38 203.217.200.85 54.71.105.94 115.61.101.108