Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.100.6.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20590
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.100.6.48.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 22:59:48 CST 2025
;; MSG SIZE  rcvd: 105
Host info
48.6.100.138.in-addr.arpa domain name pointer hermes.gate.upm.es.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.6.100.138.in-addr.arpa	name = hermes.gate.upm.es.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
140.143.236.227 attackbots
Invalid user rzv from 140.143.236.227 port 36206
2020-05-23 16:45:50
125.231.134.112 attackspam
SmallBizIT.US 1 packets to tcp(23)
2020-05-23 16:49:59
162.243.136.56 attackbotsspam
SmallBizIT.US 1 packets to tcp(23)
2020-05-23 16:39:22
36.111.182.50 attackbotsspam
2020-05-23T08:25:39.641953vps751288.ovh.net sshd\[19091\]: Invalid user jak from 36.111.182.50 port 59730
2020-05-23T08:25:39.650164vps751288.ovh.net sshd\[19091\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.111.182.50
2020-05-23T08:25:42.314298vps751288.ovh.net sshd\[19091\]: Failed password for invalid user jak from 36.111.182.50 port 59730 ssh2
2020-05-23T08:29:51.252462vps751288.ovh.net sshd\[19113\]: Invalid user rkj from 36.111.182.50 port 47850
2020-05-23T08:29:51.263275vps751288.ovh.net sshd\[19113\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.111.182.50
2020-05-23 17:17:19
106.223.90.198 attackspam
Invalid user pi from 106.223.90.198 port 12717
2020-05-23 16:59:19
164.52.24.164 attackbotsspam
Unauthorized connection attempt detected from IP address 164.52.24.164 to port 22 [T]
2020-05-23 16:38:37
27.70.224.12 attackspam
Invalid user ubnt from 27.70.224.12 port 60307
2020-05-23 17:18:45
49.232.43.151 attackbotsspam
SSH Bruteforce attack
2020-05-23 17:14:29
102.43.182.31 attackspambots
Invalid user administrator from 102.43.182.31 port 55333
2020-05-23 17:04:44
80.211.59.57 attackspambots
May 23 04:47:43 mail sshd\[58531\]: Invalid user ruj from 80.211.59.57
May 23 04:47:43 mail sshd\[58531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.59.57
...
2020-05-23 17:09:10
111.231.94.138 attackspam
(sshd) Failed SSH login from 111.231.94.138 (CN/China/-): 5 in the last 3600 secs
2020-05-23 16:57:35
49.235.16.103 attack
Invalid user gab from 49.235.16.103 port 54648
2020-05-23 17:14:04
134.17.94.55 attack
SSH brute-force: detected 30 distinct usernames within a 24-hour window.
2020-05-23 16:48:06
147.30.168.226 attackbotsspam
SmallBizIT.US 2 packets to tcp(23)
2020-05-23 16:44:19
27.154.33.210 attack
Invalid user qah from 27.154.33.210 port 41527
2020-05-23 17:17:54

Recently Reported IPs

61.59.1.244 70.218.114.208 32.47.133.190 20.89.174.211
150.147.64.118 16.199.179.133 53.129.179.183 144.54.171.49
247.9.231.68 84.51.249.13 178.27.156.144 130.248.182.174
75.213.83.117 249.141.235.109 203.11.225.202 15.153.66.28
7.93.72.245 152.82.138.17 159.201.129.245 237.251.201.22