Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Genève

Region: Geneva

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.138.168.59
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25486
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.138.168.59.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062800 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 16:01:25 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 59.168.138.137.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 59.168.138.137.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
138.0.7.243 attackspambots
port scan and connect, tcp 22 (ssh)
2019-08-16 06:30:37
91.206.15.161 attackspambots
firewall-block, port(s): 10124/tcp
2019-08-16 05:57:16
41.73.252.236 attack
Aug 15 23:56:27 vps691689 sshd[11434]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.73.252.236
Aug 15 23:56:29 vps691689 sshd[11434]: Failed password for invalid user milton from 41.73.252.236 port 54800 ssh2
Aug 16 00:02:07 vps691689 sshd[11559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.73.252.236
...
2019-08-16 06:12:10
77.42.122.218 attackspam
firewall-block, port(s): 23/tcp
2019-08-16 06:02:02
138.121.161.198 attackspambots
Aug 15 12:15:55 aiointranet sshd\[8122\]: Invalid user gao from 138.121.161.198
Aug 15 12:15:55 aiointranet sshd\[8122\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.121.161.198
Aug 15 12:15:57 aiointranet sshd\[8122\]: Failed password for invalid user gao from 138.121.161.198 port 44003 ssh2
Aug 15 12:20:55 aiointranet sshd\[8642\]: Invalid user gpadmin from 138.121.161.198
Aug 15 12:20:55 aiointranet sshd\[8642\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.121.161.198
2019-08-16 06:32:41
51.77.140.244 attackbots
Aug 16 00:17:36 vps647732 sshd[8165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.140.244
Aug 16 00:17:38 vps647732 sshd[8165]: Failed password for invalid user tester1 from 51.77.140.244 port 54278 ssh2
...
2019-08-16 06:27:30
128.14.137.182 attack
993/tcp
[2019-08-15]1pkt
2019-08-16 05:56:43
125.227.35.13 attackbots
8080/tcp 8080/tcp 8080/tcp
[2019-08-15]3pkt
2019-08-16 06:29:23
77.93.33.212 attackbots
Aug 15 23:29:47 vserver sshd\[19122\]: Invalid user oracle4 from 77.93.33.212Aug 15 23:29:48 vserver sshd\[19122\]: Failed password for invalid user oracle4 from 77.93.33.212 port 48476 ssh2Aug 15 23:33:59 vserver sshd\[19143\]: Failed password for root from 77.93.33.212 port 44061 ssh2Aug 15 23:38:06 vserver sshd\[19157\]: Failed password for root from 77.93.33.212 port 39639 ssh2
...
2019-08-16 05:55:04
123.25.50.45 attackspam
445/tcp
[2019-08-15]1pkt
2019-08-16 06:16:27
139.59.63.244 attackbots
$f2bV_matches_ltvn
2019-08-16 05:49:12
181.48.14.50 attackbotsspam
Aug 15 23:46:07 dedicated sshd[2524]: Invalid user smhyun from 181.48.14.50 port 47086
2019-08-16 06:03:34
104.248.124.163 attack
Aug 15 21:51:33 web8 sshd\[31835\]: Invalid user design from 104.248.124.163
Aug 15 21:51:33 web8 sshd\[31835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.124.163
Aug 15 21:51:35 web8 sshd\[31835\]: Failed password for invalid user design from 104.248.124.163 port 42758 ssh2
Aug 15 21:55:37 web8 sshd\[1323\]: Invalid user fffff from 104.248.124.163
Aug 15 21:55:37 web8 sshd\[1323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.124.163
2019-08-16 05:55:52
87.1.4.45 attackspam
Aug 15 23:05:42 django sshd[125266]: Failed password for invalid user admin from 87.1.4.45 port 52692 ssh2
Aug 15 23:05:45 django sshd[125266]: Failed password for invalid user admin from 87.1.4.45 port 52692 ssh2
Aug 15 23:05:48 django sshd[125266]: Failed password for invalid user admin from 87.1.4.45 port 52692 ssh2
Aug 15 23:05:51 django sshd[125266]: Failed password for invalid user admin from 87.1.4.45 port 52692 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=87.1.4.45
2019-08-16 06:17:13
99.108.141.4 attackspam
Aug 16 00:11:55 ArkNodeAT sshd\[1678\]: Invalid user test from 99.108.141.4
Aug 16 00:11:55 ArkNodeAT sshd\[1678\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=99.108.141.4
Aug 16 00:11:57 ArkNodeAT sshd\[1678\]: Failed password for invalid user test from 99.108.141.4 port 42786 ssh2
2019-08-16 06:16:44

Recently Reported IPs

113.47.6.16 166.146.222.207 107.227.139.102 182.145.223.165
91.168.55.32 93.233.119.150 29.32.179.98 78.252.84.96
25.177.184.38 19.13.45.232 27.233.234.87 132.214.219.252
102.115.6.157 152.146.105.30 41.0.167.180 53.180.39.53
57.138.233.46 57.237.97.6 4.93.218.83 98.41.107.18