Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.128.114.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55414
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.128.114.145.		IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 07:25:55 CST 2022
;; MSG SIZE  rcvd: 108
Host info
145.114.128.138.in-addr.arpa domain name pointer f8efa.zethasknorsea.info.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.114.128.138.in-addr.arpa	name = f8efa.zethasknorsea.info.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.156.73.52 attack
02/27/2020-14:19:43.805730 185.156.73.52 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-02-28 05:08:11
119.160.219.5 attackspam
firewall-block, port(s): 1433/tcp
2020-02-28 05:19:01
104.40.148.205 attackbots
Repeated RDP login failures. Last user: User4
2020-02-28 04:48:35
200.89.178.197 attackbotsspam
$f2bV_matches
2020-02-28 05:18:26
18.234.210.27 attackspambots
Automatic report - WordPress Brute Force
2020-02-28 05:14:47
116.104.233.31 attack
suspicious action Thu, 27 Feb 2020 11:20:04 -0300
2020-02-28 05:24:36
162.218.244.84 attackspam
Email rejected due to spam filtering
2020-02-28 04:45:07
141.8.132.24 attack
[Thu Feb 27 21:20:09.236135 2020] [:error] [pid 3621:tid 139837702010624] [client 141.8.132.24:65499] [client 141.8.132.24] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "696"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "103.27.207.197"] [uri "/"] [unique_id "XlfQGXgSyCP9O11ZuEgQHgAAAUw"]
...
2020-02-28 05:18:43
202.88.252.53 attackspambots
2020-02-27T07:20:22.019497-07:00 suse-nuc sshd[17473]: Invalid user rinko from 202.88.252.53 port 24960
...
2020-02-28 05:06:23
31.46.42.108 attackspambots
Feb 27 21:54:18 localhost sshd\[30508\]: Invalid user sirius from 31.46.42.108 port 47105
Feb 27 21:54:18 localhost sshd\[30508\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.46.42.108
Feb 27 21:54:21 localhost sshd\[30508\]: Failed password for invalid user sirius from 31.46.42.108 port 47105 ssh2
2020-02-28 05:07:49
122.84.233.74 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-02-28 04:50:20
190.70.1.69 attackspambots
suspicious action Thu, 27 Feb 2020 11:20:44 -0300
2020-02-28 04:47:19
181.53.251.181 attackbots
Feb 27 21:49:26 sso sshd[23387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.53.251.181
Feb 27 21:49:27 sso sshd[23387]: Failed password for invalid user media from 181.53.251.181 port 52048 ssh2
...
2020-02-28 05:19:54
14.99.38.109 attack
Invalid user admin from 14.99.38.109 port 49004
2020-02-28 05:25:47
212.145.227.244 attack
Feb 27 20:02:00 MK-Soft-VM6 sshd[18408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.227.244 
Feb 27 20:02:02 MK-Soft-VM6 sshd[18408]: Failed password for invalid user plp from 212.145.227.244 port 7230 ssh2
...
2020-02-28 04:53:04

Recently Reported IPs

138.128.114.146 138.128.114.152 118.174.93.79 138.128.114.154
138.128.114.158 138.128.114.159 138.128.114.166 138.128.114.170
118.174.94.100 138.128.114.179 138.128.114.197 138.128.114.183
138.128.114.18 138.128.114.174 138.128.114.207 138.128.114.212
138.128.114.22 138.128.114.217 138.128.114.238 138.128.114.240