Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Israel

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.134.241.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52220
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.134.241.220.		IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022101700 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Oct 17 17:15:41 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 220.241.134.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 220.241.134.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
23.27.112.71 attackbotsspam
" "
2019-11-02 02:17:22
202.84.45.250 attackbots
2019-11-01T18:18:32.807036tmaserv sshd\[27593\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.84.45.250
2019-11-01T18:18:34.791342tmaserv sshd\[27593\]: Failed password for invalid user it from 202.84.45.250 port 57082 ssh2
2019-11-01T19:22:31.839365tmaserv sshd\[813\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.84.45.250  user=root
2019-11-01T19:22:33.516637tmaserv sshd\[813\]: Failed password for root from 202.84.45.250 port 55272 ssh2
2019-11-01T19:29:05.517862tmaserv sshd\[1058\]: Invalid user camellia from 202.84.45.250 port 46634
2019-11-01T19:29:05.522963tmaserv sshd\[1058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.84.45.250
...
2019-11-02 01:37:17
78.36.13.204 attack
Unauthorized connection attempt from IP address 78.36.13.204 on Port 445(SMB)
2019-11-02 01:55:44
201.210.34.154 attackbots
Unauthorized connection attempt from IP address 201.210.34.154 on Port 445(SMB)
2019-11-02 01:50:08
200.205.138.242 attackspam
Unauthorized connection attempt from IP address 200.205.138.242 on Port 445(SMB)
2019-11-02 02:17:40
61.231.53.31 attack
Unauthorized connection attempt from IP address 61.231.53.31 on Port 445(SMB)
2019-11-02 01:57:35
138.68.49.204 attackspam
windhundgang.de 138.68.49.204 \[01/Nov/2019:12:46:30 +0100\] "POST /wp-login.php HTTP/1.1" 200 8412 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
windhundgang.de 138.68.49.204 \[01/Nov/2019:12:46:31 +0100\] "POST /xmlrpc.php HTTP/1.1" 200 4217 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-02 02:04:17
202.39.70.5 attackspam
Nov  1 11:59:30 game-panel sshd[18274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.39.70.5
Nov  1 11:59:32 game-panel sshd[18274]: Failed password for invalid user Adminvps@1 from 202.39.70.5 port 52664 ssh2
Nov  1 12:03:52 game-panel sshd[18381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.39.70.5
2019-11-02 01:43:40
81.22.45.65 attackspam
2019-11-01T19:10:04.377026+01:00 lumpi kernel: [2454194.156931] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.65 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=57591 PROTO=TCP SPT=46347 DPT=39734 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-02 02:12:42
46.229.168.147 attackspam
Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools
2019-11-02 01:58:23
158.69.110.31 attackspambots
Nov  1 12:37:21 srv01 sshd[29306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.110.31  user=root
Nov  1 12:37:23 srv01 sshd[29306]: Failed password for root from 158.69.110.31 port 42158 ssh2
Nov  1 12:41:19 srv01 sshd[29554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.110.31  user=root
Nov  1 12:41:21 srv01 sshd[29554]: Failed password for root from 158.69.110.31 port 53948 ssh2
Nov  1 12:45:18 srv01 sshd[29935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.110.31  user=root
Nov  1 12:45:20 srv01 sshd[29935]: Failed password for root from 158.69.110.31 port 37488 ssh2
...
2019-11-02 02:16:35
93.116.235.14 attackspambots
Unauthorized connection attempt from IP address 93.116.235.14 on Port 587(SMTP-MSA)
2019-11-02 01:53:53
58.40.120.14 attackspambots
Unauthorized connection attempt from IP address 58.40.120.14 on Port 445(SMB)
2019-11-02 02:15:45
196.194.200.118 attack
Unauthorized connection attempt from IP address 196.194.200.118 on Port 445(SMB)
2019-11-02 02:03:53
90.102.193.193 attack
Unauthorized connection attempt from IP address 90.102.193.193 on Port 445(SMB)
2019-11-02 01:41:39

Recently Reported IPs

48.40.106.159 160.42.47.29 59.65.166.155 160.27.2.28
160.10.100.198 51.15.6.182 130.52.237.1 228.206.11.0
35.7.240.164 137.23.18.2 130.22.8.95 160.79.12.43
130.9.54.72 84.56.207.17 130.2.52.102 96.117.44.189
224.86.111.120 209.24.214.106 130.53.1.84 130.81.205.1