Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.140.109.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63161
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.140.109.161.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 12:24:31 CST 2025
;; MSG SIZE  rcvd: 108
Host info
b'Host 161.109.140.138.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 138.140.109.161.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
2.180.230.11 attack
1582174194 - 02/20/2020 05:49:54 Host: 2.180.230.11/2.180.230.11 Port: 445 TCP Blocked
2020-02-20 19:51:44
46.165.88.73 attack
firewall-block, port(s): 23/tcp
2020-02-20 19:44:06
204.101.119.75 attack
trying to access non-authorized port
2020-02-20 19:19:45
94.190.33.227 attackbotsspam
firewall-block, port(s): 1433/tcp
2020-02-20 19:33:05
1.9.196.82 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-20 19:45:05
167.71.96.51 attackbotsspam
[portscan] tcp/22 [SSH]
[scan/connect: 2 time(s)]
*(RWIN=65535)(02201210)
2020-02-20 19:29:24
180.177.26.56 attack
Honeypot attack, port: 445, PTR: 180-177-26-56.dynamic.kbronet.com.tw.
2020-02-20 19:25:23
213.230.82.162 attack
Email rejected due to spam filtering
2020-02-20 19:21:51
36.85.223.76 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 20-02-2020 04:50:10.
2020-02-20 19:34:52
193.254.234.239 attack
Feb 19 00:46:03 PiServer sshd[4512]: Invalid user kuangtu from 193.254.234.239
Feb 19 00:46:06 PiServer sshd[4512]: Failed password for invalid user kuangtu from 193.254.234.239 port 40048 ssh2
Feb 19 01:14:18 PiServer sshd[5284]: Invalid user jenkins from 193.254.234.239
Feb 19 01:14:19 PiServer sshd[5284]: Failed password for invalid user jenkins from 193.254.234.239 port 34822 ssh2
Feb 19 01:18:03 PiServer sshd[5404]: Invalid user pg_admin from 193.254.234.239
Feb 19 01:18:05 PiServer sshd[5404]: Failed password for invalid user pg_admin from 193.254.234.239 port 60332 ssh2
Feb 19 01:20:50 PiServer sshd[5587]: Failed password for games from 193.254.234.239 port 57624 ssh2
Feb 19 01:23:26 PiServer sshd[5639]: Invalid user tmpu from 193.254.234.239
Feb 19 01:23:27 PiServer sshd[5639]: Failed password for invalid user tmpu from 193.254.234.239 port 54916 ssh2
Feb 19 01:25:59 PiServer sshd[5701]: Invalid user server from 193.254.234.239
Feb 19 01:26:00 PiServer sshd[5701]........
------------------------------
2020-02-20 19:56:34
181.31.82.26 attack
Email rejected due to spam filtering
2020-02-20 19:22:17
218.164.157.68 attack
Honeypot attack, port: 81, PTR: 218-164-157-68.dynamic-ip.hinet.net.
2020-02-20 19:27:18
178.46.212.168 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-20 19:53:07
111.73.46.244 attackspam
Port 1433 Scan
2020-02-20 19:17:14
65.52.169.39 attackspambots
trying to access non-authorized port
2020-02-20 19:55:57

Recently Reported IPs

163.26.11.69 237.138.223.248 134.131.18.74 140.187.87.66
136.145.58.153 71.58.133.71 20.160.156.240 4.124.120.141
248.29.88.94 120.22.173.221 156.229.81.213 152.181.50.70
16.147.27.187 80.185.13.145 179.225.211.56 149.34.183.52
194.167.229.166 191.208.119.179 200.59.95.22 40.228.41.72