Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.0.66.26
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29883
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.0.66.26.			IN	A

;; AUTHORITY SECTION:
.			472	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 04:32:10 CST 2022
;; MSG SIZE  rcvd: 104
Host info
26.66.0.138.in-addr.arpa domain name pointer 138-0-66-26-dynamic.onnettelecom.com.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
26.66.0.138.in-addr.arpa	name = 138-0-66-26-dynamic.onnettelecom.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
122.117.91.130 attack
Telnet Server BruteForce Attack
2020-03-06 02:53:31
61.185.140.48 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-06 02:29:39
164.132.24.138 attack
Nov  4 00:07:14 odroid64 sshd\[25439\]: User root from 164.132.24.138 not allowed because not listed in AllowUsers
Nov  4 00:07:15 odroid64 sshd\[25439\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.24.138  user=root
Feb 16 08:21:08 odroid64 sshd\[21372\]: Invalid user administrator from 164.132.24.138
Feb 16 08:21:08 odroid64 sshd\[21372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.24.138
...
2020-03-06 02:35:23
195.54.166.27 attackspam
firewall-block, port(s): 6666/tcp
2020-03-06 02:23:05
192.241.227.93 attackspam
firewall-block, port(s): 631/tcp
2020-03-06 02:51:44
164.132.42.32 attack
Jan 15 08:43:19 odroid64 sshd\[15741\]: Invalid user humberto from 164.132.42.32
Jan 15 08:43:19 odroid64 sshd\[15741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.42.32
...
2020-03-06 02:30:03
116.104.93.158 attack
Telnet Server BruteForce Attack
2020-03-06 02:39:43
202.69.49.67 attack
SMB Server BruteForce Attack
2020-03-06 02:58:08
109.167.95.71 attack
1433/tcp 1433/tcp
[2020-03-05]2pkt
2020-03-06 02:54:04
112.85.42.180 attackspam
Mar  5 18:28:08 hcbbdb sshd\[17837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.180  user=root
Mar  5 18:28:10 hcbbdb sshd\[17837\]: Failed password for root from 112.85.42.180 port 21186 ssh2
Mar  5 18:28:26 hcbbdb sshd\[17867\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.180  user=root
Mar  5 18:28:28 hcbbdb sshd\[17867\]: Failed password for root from 112.85.42.180 port 39552 ssh2
Mar  5 18:28:31 hcbbdb sshd\[17867\]: Failed password for root from 112.85.42.180 port 39552 ssh2
2020-03-06 02:32:58
124.156.208.90 attackspam
Honeypot attack, port: 5555, PTR: PTR record not found
2020-03-06 02:27:02
159.203.124.234 attackbotsspam
2020-03-05T17:52:38.060964shield sshd\[16301\]: Invalid user plex from 159.203.124.234 port 58603
2020-03-05T17:52:38.066873shield sshd\[16301\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.124.234
2020-03-05T17:52:40.047039shield sshd\[16301\]: Failed password for invalid user plex from 159.203.124.234 port 58603 ssh2
2020-03-05T18:01:58.990529shield sshd\[17939\]: Invalid user bdc from 159.203.124.234 port 46034
2020-03-05T18:01:58.997764shield sshd\[17939\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.124.234
2020-03-06 02:26:49
180.94.91.238 attack
Unauthorized connection attempt from IP address 180.94.91.238 on Port 445(SMB)
2020-03-06 02:34:21
70.55.119.171 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-06 02:33:15
103.52.216.136 attackbotsspam
SIP/5060 Probe, BF, Hack -
2020-03-06 03:01:15

Recently Reported IPs

189.85.16.151 178.70.156.31 34.239.236.33 118.120.91.181
5.187.49.150 197.40.67.178 201.26.161.47 103.115.173.147
203.236.109.113 141.98.87.223 83.44.77.218 125.124.187.19
182.121.46.4 174.138.3.151 103.199.224.115 27.72.63.68
163.179.171.184 222.110.127.169 172.67.219.86 61.57.116.160