Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.13.138.67
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 974
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.13.138.67.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 00:42:33 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 67.138.13.138.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 138.13.138.67.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
120.133.236.138 attackspam
Invalid user ykn from 120.133.236.138 port 57066
2020-02-13 07:14:25
169.255.129.161 attack
Email rejected due to spam filtering
2020-02-13 06:40:31
162.243.131.164 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-13 07:00:16
196.52.43.106 attackbotsspam
Honeypot hit.
2020-02-13 06:41:21
185.176.27.14 attackbotsspam
Multiport scan : 8 ports scanned 15689 15690 15691 15783 15784 15785 15798 15800
2020-02-13 07:10:46
41.221.52.130 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-13 07:07:37
94.247.62.154 attack
Telnet/23 MH Probe, BF, Hack -
2020-02-13 06:39:50
87.3.70.188 attackbots
Invalid user user1 from 87.3.70.188 port 60352
2020-02-13 06:48:22
185.189.151.73 attack
trying to access non-authorized port
2020-02-13 07:17:54
84.15.212.100 attackspam
Telnet/23 MH Probe, BF, Hack -
2020-02-13 06:54:22
207.6.1.11 attackbotsspam
Feb 12 23:43:34 silence02 sshd[18890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.6.1.11
Feb 12 23:43:36 silence02 sshd[18890]: Failed password for invalid user zeng from 207.6.1.11 port 52288 ssh2
Feb 12 23:46:11 silence02 sshd[19143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.6.1.11
2020-02-13 07:04:21
80.211.59.160 attackspam
Invalid user elh from 80.211.59.160 port 51090
2020-02-13 06:52:20
41.215.10.6 attackspam
Brute force attempt
2020-02-13 06:51:43
191.232.163.135 attackspambots
Invalid user roundy from 191.232.163.135 port 45500
2020-02-13 07:18:48
61.160.82.82 attack
Feb 12 23:20:13 jane sshd[28901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.160.82.82 
Feb 12 23:20:15 jane sshd[28901]: Failed password for invalid user xz from 61.160.82.82 port 32202 ssh2
...
2020-02-13 06:56:20

Recently Reported IPs

198.87.160.195 217.234.65.18 149.167.21.229 73.141.189.205
95.201.86.109 16.218.25.13 179.195.92.230 15.97.153.142
222.200.67.225 163.0.154.103 249.229.233.34 95.75.61.206
103.142.218.201 23.69.93.246 201.128.209.34 48.22.146.175
190.10.135.226 61.11.61.3 171.60.202.183 54.228.78.242