Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.73.243.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52126
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.73.243.138.			IN	A

;; AUTHORITY SECTION:
.			398	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032102 1800 900 604800 86400

;; Query time: 84 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 22 06:36:57 CST 2022
;; MSG SIZE  rcvd: 107
Host info
138.243.73.109.in-addr.arpa domain name pointer gemzo138-109-73-243.gemzo.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.243.73.109.in-addr.arpa	name = gemzo138-109-73-243.gemzo.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
176.92.193.227 attack
Telnet Server BruteForce Attack
2020-09-07 21:54:26
46.125.249.51 attackspambots
Port Scan: TCP/443
2020-09-07 21:53:45
83.208.253.10 attack
 TCP (SYN) 83.208.253.10:43071 -> port 23, len 44
2020-09-07 21:39:19
117.206.160.173 attackbotsspam
Unauthoirsed login to NAS
2020-09-07 21:52:22
113.230.211.180 attackbotsspam
 TCP (SYN) 113.230.211.180:54438 -> port 23, len 40
2020-09-07 22:07:07
23.129.64.183 attack
Sep  7 14:28:41 pve1 sshd[1252]: Failed password for root from 23.129.64.183 port 24852 ssh2
Sep  7 14:28:45 pve1 sshd[1252]: Failed password for root from 23.129.64.183 port 24852 ssh2
...
2020-09-07 21:36:31
49.235.158.195 attackbots
...
2020-09-07 22:08:25
185.51.213.53 attack
1599411238 - 09/06/2020 18:53:58 Host: 185.51.213.53/185.51.213.53 Port: 445 TCP Blocked
2020-09-07 21:27:29
71.6.233.230 attackspambots
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-07 21:29:06
122.14.220.129 attack
Failed password for root from 122.14.220.129 port 35054 ssh2
2020-09-07 21:35:54
185.176.27.34 attack
ET DROP Dshield Block Listed Source group 1 - port: 37892 proto: tcp cat: Misc Attackbytes: 60
2020-09-07 21:50:53
105.97.45.179 attackbotsspam
105.97.45.179 - - [06/Sep/2020:19:10:54 +0100] "POST /wp-login.php HTTP/1.1" 200 7651 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
105.97.45.179 - - [06/Sep/2020:19:21:15 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
105.97.45.179 - - [06/Sep/2020:19:21:16 +0100] "POST /wp-login.php HTTP/1.1" 200 7651 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
...
2020-09-07 21:42:54
141.98.10.210 attackspambots
Sep  7 14:58:03 haigwepa sshd[27832]: Failed password for root from 141.98.10.210 port 36397 ssh2
...
2020-09-07 22:05:05
188.163.89.75 attack
188.163.89.75 - - [07/Sep/2020:14:19:13 +0100] "POST /wp-login.php HTTP/1.1" 200 1882 "https://leerichard.co.uk/wp-login.php" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/53.0.2785.143 Safari/537.36"
188.163.89.75 - - [07/Sep/2020:14:29:17 +0100] "POST /wp-login.php HTTP/1.1" 200 1882 "https://leerichard.co.uk/wp-login.php" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/53.0.2785.143 Safari/537.36"
188.163.89.75 - - [07/Sep/2020:14:29:17 +0100] "POST /wp-login.php HTTP/1.1" 200 1882 "https://leerichard.co.uk/wp-login.php" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/53.0.2785.143 Safari/537.36"
...
2020-09-07 21:31:26
114.199.123.211 attackspam
SSH login attempts.
2020-09-07 21:35:06

Recently Reported IPs

109.73.184.242 109.74.205.167 109.74.23.13 109.74.83.72
109.75.178.153 109.79.30.20 109.94.222.144 109.94.223.107
109.94.223.218 109.94.224.227 109.95.146.107 109.95.152.58
109.95.156.154 109.95.158.101 109.95.158.159 109.95.210.40
109.99.255.251 109.99.50.164 110.10.129.211 110.10.129.96