Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Israel

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.134.149.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57133
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.134.149.3.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012102 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 11:14:05 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 3.149.134.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 3.149.134.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.226.145.236 attackbotsspam
2,78-06/07 [bc04/m147] PostRequest-Spammer scoring: Dodoma
2020-06-10 07:51:52
82.149.13.45 attackspam
$f2bV_matches
2020-06-10 07:17:42
125.124.82.173 attackspambots
Jun  9 22:33:55 hell sshd[25333]: Failed password for root from 125.124.82.173 port 35992 ssh2
...
2020-06-10 07:47:53
178.62.234.124 attack
370. On Jun 9 2020 experienced a Brute Force SSH login attempt -> 26 unique times by 178.62.234.124.
2020-06-10 07:51:23
183.17.230.250 attackbots
20/6/9@16:17:02: FAIL: Alarm-Network address from=183.17.230.250
20/6/9@16:17:02: FAIL: Alarm-Network address from=183.17.230.250
...
2020-06-10 07:42:28
129.211.146.50 attackbotsspam
2020-06-10T00:44:19.648068centos sshd[4642]: Failed password for invalid user kurauone from 129.211.146.50 port 44154 ssh2
2020-06-10T00:49:50.660809centos sshd[4986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.146.50  user=root
2020-06-10T00:49:52.992213centos sshd[4986]: Failed password for root from 129.211.146.50 port 47066 ssh2
...
2020-06-10 07:21:52
43.226.148.66 attackbotsspam
(sshd) Failed SSH login from 43.226.148.66 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun  9 22:07:24 elude sshd[17352]: Invalid user abi from 43.226.148.66 port 39428
Jun  9 22:07:27 elude sshd[17352]: Failed password for invalid user abi from 43.226.148.66 port 39428 ssh2
Jun  9 22:13:40 elude sshd[18354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.148.66  user=root
Jun  9 22:13:42 elude sshd[18354]: Failed password for root from 43.226.148.66 port 40574 ssh2
Jun  9 22:17:32 elude sshd[18937]: Invalid user mhviet from 43.226.148.66 port 47626
2020-06-10 07:22:52
122.55.190.12 attack
Jun 10 01:13:35  sshd\[8377\]: User root from 122.55.190.12 not allowed because not listed in AllowUsersJun 10 01:13:37  sshd\[8377\]: Failed password for invalid user root from 122.55.190.12 port 55710 ssh2
...
2020-06-10 07:34:56
66.249.155.245 attackspam
763. On Jun 9 2020 experienced a Brute Force SSH login attempt -> 38 unique times by 66.249.155.245.
2020-06-10 07:43:19
180.76.124.20 attackspambots
2020-06-09T22:11:35.175515shield sshd\[27645\]: Invalid user ubnt from 180.76.124.20 port 57036
2020-06-09T22:11:35.179585shield sshd\[27645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.124.20
2020-06-09T22:11:37.114335shield sshd\[27645\]: Failed password for invalid user ubnt from 180.76.124.20 port 57036 ssh2
2020-06-09T22:14:35.948448shield sshd\[29015\]: Invalid user joeflores from 180.76.124.20 port 39348
2020-06-09T22:14:35.953315shield sshd\[29015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.124.20
2020-06-10 07:36:33
46.38.145.251 attackspam
Jun 10 01:32:16 srv01 postfix/smtpd\[20006\]: warning: unknown\[46.38.145.251\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 10 01:32:36 srv01 postfix/smtpd\[21132\]: warning: unknown\[46.38.145.251\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 10 01:32:36 srv01 postfix/smtpd\[18673\]: warning: unknown\[46.38.145.251\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 10 01:33:18 srv01 postfix/smtpd\[22689\]: warning: unknown\[46.38.145.251\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 10 01:33:50 srv01 postfix/smtpd\[22689\]: warning: unknown\[46.38.145.251\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-10 07:39:30
222.186.175.23 attackbots
Jun  9 23:08:33 rush sshd[19772]: Failed password for root from 222.186.175.23 port 17796 ssh2
Jun  9 23:08:44 rush sshd[19774]: Failed password for root from 222.186.175.23 port 56875 ssh2
...
2020-06-10 07:14:03
167.99.170.83 attack
2020-06-09T22:30:20.051380shield sshd\[3632\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.170.83  user=root
2020-06-09T22:30:22.428851shield sshd\[3632\]: Failed password for root from 167.99.170.83 port 38982 ssh2
2020-06-09T22:33:02.482415shield sshd\[4801\]: Invalid user ubuntu from 167.99.170.83 port 53774
2020-06-09T22:33:02.485898shield sshd\[4801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.170.83
2020-06-09T22:33:04.435804shield sshd\[4801\]: Failed password for invalid user ubuntu from 167.99.170.83 port 53774 ssh2
2020-06-10 07:46:28
41.185.73.242 attack
615. On Jun 9 2020 experienced a Brute Force SSH login attempt -> 33 unique times by 41.185.73.242.
2020-06-10 07:44:06
183.237.228.2 attackbots
Jun  9 23:01:14 vps647732 sshd[3166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.237.228.2
Jun  9 23:01:16 vps647732 sshd[3166]: Failed password for invalid user att from 183.237.228.2 port 41126 ssh2
...
2020-06-10 07:23:24

Recently Reported IPs

253.181.72.131 87.236.153.183 83.75.44.45 153.119.120.11
41.78.27.126 22.172.67.44 251.245.15.45 138.222.62.52
159.187.17.30 252.29.84.188 68.166.58.230 31.254.7.54
118.82.86.232 173.153.127.119 211.192.111.199 61.244.78.240
25.197.42.128 53.186.203.181 159.84.29.202 152.31.161.189