Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.141.40.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38384
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.141.40.69.			IN	A

;; AUTHORITY SECTION:
.			525	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011001 1800 900 604800 86400

;; Query time: 417 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 04:08:24 CST 2022
;; MSG SIZE  rcvd: 106
Host info
b'Host 69.40.141.138.in-addr.arpa. not found: 3(NXDOMAIN)
'
Nslookup info:
server can't find 138.141.40.69.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
61.177.172.128 attack
Nov 26 15:47:12 MK-Soft-Root2 sshd[18195]: Failed password for root from 61.177.172.128 port 39128 ssh2
Nov 26 15:47:17 MK-Soft-Root2 sshd[18195]: Failed password for root from 61.177.172.128 port 39128 ssh2
...
2019-11-26 22:55:52
185.37.26.177 attack
Fail2Ban Ban Triggered
HTTP SQL Injection Attempt
2019-11-26 23:03:25
102.64.66.251 attack
Unauthorized connection attempt from IP address 102.64.66.251 on Port 445(SMB)
2019-11-26 22:46:15
190.128.230.14 attackbotsspam
Nov 26 15:38:16 OPSO sshd\[7475\]: Invalid user adriana from 190.128.230.14 port 39256
Nov 26 15:38:16 OPSO sshd\[7475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.230.14
Nov 26 15:38:18 OPSO sshd\[7475\]: Failed password for invalid user adriana from 190.128.230.14 port 39256 ssh2
Nov 26 15:47:14 OPSO sshd\[9109\]: Invalid user wh from 190.128.230.14 port 35719
Nov 26 15:47:14 OPSO sshd\[9109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.230.14
2019-11-26 22:56:53
128.199.167.233 attackbots
Nov 26 14:51:02 www_kotimaassa_fi sshd[20345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.167.233
Nov 26 14:51:04 www_kotimaassa_fi sshd[20345]: Failed password for invalid user info from 128.199.167.233 port 35930 ssh2
...
2019-11-26 22:55:01
109.75.36.60 attackbotsspam
Unauthorized connection attempt from IP address 109.75.36.60 on Port 445(SMB)
2019-11-26 23:09:01
222.186.175.181 attackbotsspam
Nov 26 04:57:43 web1 sshd\[2611\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.181  user=root
Nov 26 04:57:45 web1 sshd\[2611\]: Failed password for root from 222.186.175.181 port 47536 ssh2
Nov 26 04:57:49 web1 sshd\[2611\]: Failed password for root from 222.186.175.181 port 47536 ssh2
Nov 26 04:57:51 web1 sshd\[2611\]: Failed password for root from 222.186.175.181 port 47536 ssh2
Nov 26 04:57:55 web1 sshd\[2611\]: Failed password for root from 222.186.175.181 port 47536 ssh2
2019-11-26 22:59:25
94.191.41.77 attackbots
Nov 26 10:40:15 ArkNodeAT sshd\[15078\]: Invalid user named from 94.191.41.77
Nov 26 10:40:15 ArkNodeAT sshd\[15078\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.41.77
Nov 26 10:40:17 ArkNodeAT sshd\[15078\]: Failed password for invalid user named from 94.191.41.77 port 54658 ssh2
2019-11-26 22:28:16
103.126.100.67 attackbots
Nov 26 17:16:10 server sshd\[10144\]: Invalid user takeishi from 103.126.100.67
Nov 26 17:16:10 server sshd\[10144\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.126.100.67 
Nov 26 17:16:12 server sshd\[10144\]: Failed password for invalid user takeishi from 103.126.100.67 port 53950 ssh2
Nov 26 17:47:24 server sshd\[17846\]: Invalid user vaterlaus from 103.126.100.67
Nov 26 17:47:24 server sshd\[17846\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.126.100.67 
...
2019-11-26 22:51:03
52.247.223.210 attackbots
Nov 26 15:47:07 lnxweb61 sshd[12450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.247.223.210
2019-11-26 23:04:07
1.245.61.144 attackbots
Nov 26 15:19:27 MK-Soft-VM6 sshd[14569]: Failed password for root from 1.245.61.144 port 58948 ssh2
Nov 26 15:23:28 MK-Soft-VM6 sshd[14603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.245.61.144 
...
2019-11-26 22:23:56
51.38.234.224 attackbots
SSH Brute Force, server-1 sshd[2188]: Failed password for invalid user sartan from 51.38.234.224 port 50428 ssh2
2019-11-26 22:34:01
114.219.84.68 attackspambots
SASL broute force
2019-11-26 23:05:16
178.128.31.218 attackbotsspam
WordPress login Brute force / Web App Attack on client site.
2019-11-26 22:58:58
198.98.52.141 attackbots
Nov 26 14:47:10 localhost sshd\[25789\]: Invalid user user from 198.98.52.141 port 38680
Nov 26 14:47:10 localhost sshd\[25782\]: Invalid user vagrant from 198.98.52.141 port 38672
Nov 26 14:47:10 localhost sshd\[25788\]: Invalid user vsftp from 198.98.52.141 port 38684
...
2019-11-26 23:00:55

Recently Reported IPs

166.213.72.186 162.129.176.124 107.77.81.121 118.149.33.252
199.136.12.180 182.219.131.34 253.103.137.240 118.238.113.9
142.110.151.207 172.248.129.234 117.146.23.145 162.8.116.196
15.197.228.169 255.58.153.232 11.196.29.184 138.69.236.214
91.240.178.194 232.186.99.141 192.182.23.153 212.172.50.7