Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Chile

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
138.0.137.76 attack
Unauthorized connection attempt detected from IP address 138.0.137.76 to port 8080
2020-06-13 03:43:46
138.0.133.8 attackbotsspam
Unauthorised access (May 31) SRC=138.0.133.8 LEN=52 TTL=117 ID=32536 DF TCP DPT=445 WINDOW=8192 SYN
2020-05-31 18:17:24
138.0.137.116 attackbotsspam
port scan and connect, tcp 23 (telnet)
2019-08-10 06:03:17
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.0.13.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5904
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.0.13.248.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021600 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 17:29:21 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 248.13.0.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 248.13.0.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
124.195.254.225 attack
SmallBizIT.US 1 packets to tcp(23)
2020-05-21 02:15:14
123.135.127.85 attackbots
SmallBizIT.US 1 packets to tcp(3389)
2020-05-21 02:15:32
149.241.220.245 attackbots
SmallBizIT.US 1 packets to tcp(2323)
2020-05-21 02:11:12
162.243.137.85 attack
SmallBizIT.US 1 packets to tcp(22)
2020-05-21 02:10:19
184.105.247.251 attack
SmallBizIT.US 1 packets to tcp(2323)
2020-05-21 02:03:27
54.72.170.109 attackbotsspam
[Wed May 20 17:01:50.967417 2020] [access_compat:error] [pid 22974] [client 54.72.170.109:36790] AH01797: client denied by server configuration: /var/www/html/josh/wp-login.php
...
2020-05-21 01:52:12
89.248.168.217 attackspam
89.248.168.217 was recorded 5 times by 3 hosts attempting to connect to the following ports: 6886,6656. Incident counter (4h, 24h, all-time): 5, 35, 20534
2020-05-21 01:45:46
112.120.104.42 attack
SmallBizIT.US 1 packets to tcp(2323)
2020-05-21 01:55:59
222.82.214.218 attack
frenzy
2020-05-21 02:01:05
176.113.115.210 attackbotsspam
SmallBizIT.US 3 packets to tcp(33706,33747,33829)
2020-05-21 02:06:06
85.41.253.190 attackbots
Honeypot attack, port: 445, PTR: host190-253-static.41-85-b.business.telecomitalia.it.
2020-05-21 01:50:32
176.113.115.41 attackbots
ET DROP Dshield Block Listed Source group 1 - port: 5005 proto: TCP cat: Misc Attack
2020-05-21 02:06:30
128.116.40.29 attack
SmallBizIT.US 1 packets to icmp(0)
2020-05-21 02:14:21
103.28.66.13 attackspam
SmallBizIT.US 1 packets to tcp(23)
2020-05-21 01:57:43
185.153.196.245 attackbots
May 20 18:13:15 debian-2gb-nbg1-2 kernel: \[12250021.087796\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.153.196.245 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=3283 PROTO=TCP SPT=48672 DPT=3390 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-21 02:01:20

Recently Reported IPs

129.255.105.167 84.179.170.179 141.181.73.27 241.45.16.164
54.40.66.68 78.254.68.52 133.246.91.140 223.160.60.154
175.190.6.87 117.213.145.137 20.208.82.43 236.130.88.58
99.236.101.88 155.22.14.13 6.220.115.7 191.27.98.75
77.215.162.101 182.201.184.18 43.40.177.150 107.160.115.169