Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.143.102.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51964
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.143.102.249.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121501 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 16 04:51:55 CST 2024
;; MSG SIZE  rcvd: 108
Host info
Host 249.102.143.138.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 138.143.102.249.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
51.38.93.221 attackspambots
SIP/5060 Probe, BF, Hack -
2019-12-24 22:25:20
31.171.0.55 attackspambots
Brute force attempt
2019-12-24 22:44:14
194.36.174.20 attack
port scan and connect, tcp 1433 (ms-sql-s)
2019-12-24 22:16:54
112.72.79.182 attackspam
Unauthorized connection attempt detected from IP address 112.72.79.182 to port 445
2019-12-24 22:27:28
81.250.173.152 attackspambots
$f2bV_matches
2019-12-24 22:57:01
197.57.63.152 attackspambots
DLink DSL Remote OS Command Injection Vulnerability, PTR: host-197.57.63.152.tedata.net.
2019-12-24 22:45:02
45.55.93.245 attackspam
45.55.93.245 - - [24/Dec/2019:07:32:24 +0000] "POST /wp-login.php HTTP/1.1" 200 6393 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
45.55.93.245 - - [24/Dec/2019:07:32:25 +0000] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-12-24 22:29:20
113.165.2.85 attackspambots
Unauthorized connection attempt detected from IP address 113.165.2.85 to port 445
2019-12-24 22:18:02
196.52.43.104 attackspam
Unauthorized access to SSH at 24/Dec/2019:13:43:28 +0000.
Received:  (SSH-2.0-ZGrab ZGrab SSH Survey)
2019-12-24 22:35:35
188.254.0.112 attackspam
Brute-force attempt banned
2019-12-24 22:32:35
49.145.197.95 attackspam
Unauthorized connection attempt detected from IP address 49.145.197.95 to port 445
2019-12-24 22:42:54
90.189.180.237 attackspam
Spam Timestamp : 24-Dec-19 06:32   BlockList Provider  combined abuse   (208)
2019-12-24 22:54:45
121.164.117.201 attackbotsspam
$f2bV_matches
2019-12-24 22:39:59
138.188.50.243 attackspam
Honeypot hit.
2019-12-24 22:55:45
156.220.87.175 attackspambots
DLink DSL Remote OS Command Injection Vulnerability, PTR: host-156.220.175.87-static.tedata.net.
2019-12-24 22:42:38

Recently Reported IPs

231.236.224.115 44.59.18.46 219.174.111.104 37.169.168.34
138.4.18.175 216.30.222.201 135.60.150.104 217.12.199.102
107.158.119.153 164.170.100.48 240.248.1.229 32.242.42.172
44.221.179.255 9.24.50.234 138.131.11.67 103.3.46.2
143.45.46.9 136.104.37.15 79.159.43.17 118.176.162.127