Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.128.138.27
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41689
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.128.138.27.			IN	A

;; AUTHORITY SECTION:
.			453	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 12:26:18 CST 2022
;; MSG SIZE  rcvd: 107
Host info
27.138.128.138.in-addr.arpa domain name pointer hosted-by.i3d.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
27.138.128.138.in-addr.arpa	name = hosted-by.i3d.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
120.203.8.179 attackspam
2323/tcp 23/tcp 23/tcp
[2019-06-26/08-12]3pkt
2019-08-13 05:24:17
5.59.143.43 attackspambots
proto=tcp  .  spt=55139  .  dpt=25  .     (listed on Blocklist de  Aug 12)     (777)
2019-08-13 04:59:54
59.46.174.94 attackbots
19/8/12@08:13:29: FAIL: Alarm-Intrusion address from=59.46.174.94
19/8/12@08:13:29: FAIL: Alarm-Intrusion address from=59.46.174.94
...
2019-08-13 05:23:14
81.17.27.135 attackspam
C1,WP GET /wp-login.php
2019-08-13 05:07:25
52.237.23.159 attackspam
Aug 12 12:05:23 raspberrypi sshd\[18515\]: Invalid user lazare from 52.237.23.159Aug 12 12:05:26 raspberrypi sshd\[18515\]: Failed password for invalid user lazare from 52.237.23.159 port 34264 ssh2Aug 12 12:13:15 raspberrypi sshd\[18809\]: Invalid user www from 52.237.23.159Aug 12 12:13:17 raspberrypi sshd\[18809\]: Failed password for invalid user www from 52.237.23.159 port 54418 ssh2
...
2019-08-13 05:28:17
89.218.78.226 attackbotsspam
445/tcp 445/tcp 445/tcp...
[2019-06-14/08-12]16pkt,1pt.(tcp)
2019-08-13 04:55:16
14.161.0.82 attackspam
445/tcp 445/tcp
[2019-08-02/12]2pkt
2019-08-13 04:52:56
148.70.113.127 attack
Aug 12 22:19:10 lnxweb62 sshd[4690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.113.127
2019-08-13 05:09:06
35.183.135.148 attackspambots
Aug 12 12:13:12 *** sshd[30765]: Invalid user testing from 35.183.135.148
2019-08-13 05:30:19
109.94.119.192 attackspambots
23/tcp 8080/tcp
[2019-07-21/08-12]2pkt
2019-08-13 05:22:15
117.3.64.176 attack
445/tcp 445/tcp 445/tcp...
[2019-07-16/08-12]4pkt,1pt.(tcp)
2019-08-13 04:49:33
5.70.112.146 attackspam
Automatic report - Port Scan Attack
2019-08-13 05:30:43
185.242.113.224 attack
SSH Brute Force, server-1 sshd[26452]: Failed password for root from 185.242.113.224 port 43518 ssh2
2019-08-13 05:12:34
138.68.87.0 attackspam
SSH Brute-Force attacks
2019-08-13 04:54:42
187.44.210.246 attackspam
SPF Fail sender not permitted to send mail for @itsweb.com.br / Sent mail to target address hacked/leaked from abandonia in 2016
2019-08-13 05:04:29

Recently Reported IPs

138.122.98.45 138.122.98.87 138.128.165.162 138.128.171.195
138.128.165.157 138.128.167.37 138.128.160.2 138.128.240.15
138.128.171.50 138.128.181.34 138.128.170.162 138.128.189.154
138.128.68.207 138.128.43.131 138.16.162.17 138.128.97.9
138.128.78.186 138.131.146.134 138.128.78.12 138.185.174.78