Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.138.215.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37441
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.138.215.134.		IN	A

;; AUTHORITY SECTION:
.			299	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030302 1800 900 604800 86400

;; Query time: 91 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 13:21:03 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 134.215.138.113.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.215.138.113.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
81.95.42.61 attackspambots
Total attacks: 2
2020-07-02 05:36:36
101.50.71.19 attackbotsspam
Jun 24 17:38:43 mail1 sshd[23460]: Invalid user admin from 101.50.71.19 port 58102
Jun 24 17:38:43 mail1 sshd[23460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.50.71.19
Jun 24 17:38:45 mail1 sshd[23460]: Failed password for invalid user admin from 101.50.71.19 port 58102 ssh2
Jun 24 17:38:45 mail1 sshd[23460]: Connection closed by 101.50.71.19 port 58102 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=101.50.71.19
2020-07-02 05:54:10
193.169.252.217 attackspambots
IP 193.169.252.217 attacked honeypot on port: 3389 at 6/29/2020 1:36:45 AM
2020-07-02 05:49:20
91.233.42.38 attackspambots
Jul  1 00:23:32 rancher-0 sshd[64472]: Invalid user tts from 91.233.42.38 port 51700
...
2020-07-02 05:34:03
195.54.160.115 attack
Scanning an empty webserver with deny all robots.txt
2020-07-02 05:44:11
212.70.149.34 attack
2020-07-01 03:09:45 dovecot_login authenticator failed for \(User\) \[212.70.149.34\]: 535 Incorrect authentication data \(set_id=gabrielle@org.ua\)2020-07-01 03:10:20 dovecot_login authenticator failed for \(User\) \[212.70.149.34\]: 535 Incorrect authentication data \(set_id=gandolf@org.ua\)2020-07-01 03:10:54 dovecot_login authenticator failed for \(User\) \[212.70.149.34\]: 535 Incorrect authentication data \(set_id=garcia@org.ua\)
...
2020-07-02 06:24:04
219.137.53.146 attack
20 attempts against mh-ssh on flare
2020-07-02 06:30:30
185.39.11.88 attack
Persistent intruder - 185.39.11.88
2020-07-02 06:15:11
175.6.35.207 attack
Jun 30 13:09:23 itv-usvr-02 sshd[26641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.6.35.207  user=root
Jun 30 13:09:25 itv-usvr-02 sshd[26641]: Failed password for root from 175.6.35.207 port 33778 ssh2
Jun 30 13:12:36 itv-usvr-02 sshd[26749]: Invalid user hm from 175.6.35.207 port 42304
Jun 30 13:12:36 itv-usvr-02 sshd[26749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.6.35.207
Jun 30 13:12:36 itv-usvr-02 sshd[26749]: Invalid user hm from 175.6.35.207 port 42304
Jun 30 13:12:38 itv-usvr-02 sshd[26749]: Failed password for invalid user hm from 175.6.35.207 port 42304 ssh2
2020-07-02 06:25:03
186.213.100.213 attackspambots
$f2bV_matches
2020-07-02 06:05:19
13.68.222.199 attackspam
Jul  1 02:07:18 serwer sshd\[15885\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.68.222.199  user=root
Jul  1 02:07:18 serwer sshd\[15887\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.68.222.199  user=root
Jul  1 02:07:21 serwer sshd\[15885\]: Failed password for root from 13.68.222.199 port 62658 ssh2
...
2020-07-02 06:04:04
193.70.38.187 attackbots
2020-06-30T17:10:47.140364na-vps210223 sshd[11000]: Invalid user joomla from 193.70.38.187 port 39544
2020-06-30T17:10:47.144701na-vps210223 sshd[11000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.ip-193-70-38.eu
2020-06-30T17:10:47.140364na-vps210223 sshd[11000]: Invalid user joomla from 193.70.38.187 port 39544
2020-06-30T17:10:49.457450na-vps210223 sshd[11000]: Failed password for invalid user joomla from 193.70.38.187 port 39544 ssh2
2020-06-30T17:13:53.655511na-vps210223 sshd[19747]: Invalid user lukas from 193.70.38.187 port 37808
...
2020-07-02 06:24:20
62.171.151.248 attackspambots
21 attempts against mh-ssh on rock
2020-07-02 06:01:12
93.48.89.62 attackspambots
firewall-block, port(s): 81/tcp
2020-07-02 06:18:47
36.111.182.133 attackspam
Jun 30 20:52:12 vps1 sshd[2054220]: Invalid user omega from 36.111.182.133 port 36400
Jun 30 20:52:14 vps1 sshd[2054220]: Failed password for invalid user omega from 36.111.182.133 port 36400 ssh2
...
2020-07-02 05:35:40

Recently Reported IPs

113.138.214.99 113.138.215.154 113.138.215.105 113.138.215.112
113.138.214.97 113.138.215.172 113.138.215.164 113.138.215.156
113.138.215.11 113.138.215.18 113.138.215.180 113.138.215.132
113.138.215.189 113.184.23.181 113.138.215.202 113.138.215.187
113.138.215.214 113.138.215.168 113.138.215.21 113.138.215.210