Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.150.119.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49997
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.150.119.148.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 12:57:47 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 148.119.150.138.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 138.150.119.148.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
158.69.217.248 attack
Aug  1 16:04:44 MainVPS sshd[4876]: Invalid user administrator from 158.69.217.248 port 53530
Aug  1 16:04:44 MainVPS sshd[4876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.217.248
Aug  1 16:04:44 MainVPS sshd[4876]: Invalid user administrator from 158.69.217.248 port 53530
Aug  1 16:04:47 MainVPS sshd[4876]: Failed password for invalid user administrator from 158.69.217.248 port 53530 ssh2
Aug  1 16:04:44 MainVPS sshd[4876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.217.248
Aug  1 16:04:44 MainVPS sshd[4876]: Invalid user administrator from 158.69.217.248 port 53530
Aug  1 16:04:47 MainVPS sshd[4876]: Failed password for invalid user administrator from 158.69.217.248 port 53530 ssh2
Aug  1 16:04:47 MainVPS sshd[4876]: Disconnecting invalid user administrator 158.69.217.248 port 53530: Change of username or service not allowed: (administrator,ssh-connection) -> (amx,ssh-connection) [preauth]
...
2019-08-01 22:05:05
49.88.112.55 attack
Aug  1 16:14:37 MainVPS sshd[5735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.55  user=root
Aug  1 16:14:40 MainVPS sshd[5735]: Failed password for root from 49.88.112.55 port 6105 ssh2
Aug  1 16:14:55 MainVPS sshd[5735]: error: maximum authentication attempts exceeded for root from 49.88.112.55 port 6105 ssh2 [preauth]
Aug  1 16:14:37 MainVPS sshd[5735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.55  user=root
Aug  1 16:14:40 MainVPS sshd[5735]: Failed password for root from 49.88.112.55 port 6105 ssh2
Aug  1 16:14:55 MainVPS sshd[5735]: error: maximum authentication attempts exceeded for root from 49.88.112.55 port 6105 ssh2 [preauth]
Aug  1 16:14:57 MainVPS sshd[5757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.55  user=root
Aug  1 16:15:00 MainVPS sshd[5757]: Failed password for root from 49.88.112.55 port 16298 ssh2
...
2019-08-01 22:44:11
112.85.42.194 attack
Aug  1 15:27:26 dcd-gentoo sshd[6843]: User root from 112.85.42.194 not allowed because none of user's groups are listed in AllowGroups
Aug  1 15:27:28 dcd-gentoo sshd[6843]: error: PAM: Authentication failure for illegal user root from 112.85.42.194
Aug  1 15:27:26 dcd-gentoo sshd[6843]: User root from 112.85.42.194 not allowed because none of user's groups are listed in AllowGroups
Aug  1 15:27:28 dcd-gentoo sshd[6843]: error: PAM: Authentication failure for illegal user root from 112.85.42.194
Aug  1 15:27:26 dcd-gentoo sshd[6843]: User root from 112.85.42.194 not allowed because none of user's groups are listed in AllowGroups
Aug  1 15:27:28 dcd-gentoo sshd[6843]: error: PAM: Authentication failure for illegal user root from 112.85.42.194
Aug  1 15:27:28 dcd-gentoo sshd[6843]: Failed keyboard-interactive/pam for invalid user root from 112.85.42.194 port 43068 ssh2
...
2019-08-01 21:39:23
201.95.122.168 attack
Aug  1 14:03:28 game-panel sshd[29945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.95.122.168
Aug  1 14:03:31 game-panel sshd[29945]: Failed password for invalid user ts from 201.95.122.168 port 38559 ssh2
Aug  1 14:08:39 game-panel sshd[30052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.95.122.168
2019-08-01 22:08:55
114.223.97.248 attackspambots
Jul 30 22:37:05 mail sshd[29108]: reveeclipse mapping checking getaddrinfo for 248.97.223.114.broad.wx.js.dynamic.163data.com.cn [114.223.97.248] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul 30 22:37:08 mail sshd[29108]: Failed password for invalid user server from 114.223.97.248 port 33042 ssh2
Jul 30 22:37:08 mail sshd[29108]: Received disconnect from 114.223.97.248: 11: Bye Bye [preauth]
Jul 31 02:15:13 mail sshd[1000]: reveeclipse mapping checking getaddrinfo for 248.97.223.114.broad.wx.js.dynamic.163data.com.cn [114.223.97.248] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul 31 02:15:15 mail sshd[1000]: Failed password for invalid user sale from 114.223.97.248 port 42383 ssh2
Jul 31 02:15:15 mail sshd[1000]: Received disconnect from 114.223.97.248: 11: Bye Bye [preauth]
Jul 31 02:18:04 mail sshd[1068]: reveeclipse mapping checking getaddrinfo for 248.97.223.114.broad.wx.js.dynamic.163data.com.cn [114.223.97.248] failed - POSSIBLE BREAK-IN ATTEMPT!


........
-----------------------------------------------
https://www
2019-08-01 22:13:58
206.189.89.69 attackspam
Aug  1 15:22:27 vps691689 sshd[7767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.89.69
Aug  1 15:22:30 vps691689 sshd[7767]: Failed password for invalid user tye from 206.189.89.69 port 50442 ssh2
...
2019-08-01 21:36:21
104.248.33.152 attack
Automatic report - Banned IP Access
2019-08-01 22:12:15
51.91.18.233 attack
Automatic report - Port Scan Attack
2019-08-01 22:07:41
88.248.90.99 attackspam
Automatic report - Port Scan Attack
2019-08-01 21:42:08
212.176.18.221 attackbots
Unauthorised access (Aug  1) SRC=212.176.18.221 LEN=52 TTL=120 ID=25921 DF TCP DPT=445 WINDOW=8192 SYN
2019-08-01 22:36:13
77.253.211.222 attack
C2,WP GET /wp-login.php
GET /wp-login.php
2019-08-01 22:22:36
112.238.42.34 attackbotsspam
" "
2019-08-01 22:12:41
201.156.218.159 attackspam
Automatic report - Port Scan Attack
2019-08-01 21:42:49
46.14.195.34 attack
79 attempts to access administrative URLs
2019-08-01 21:57:37
217.136.19.76 attackbots
Automatic report - Banned IP Access
2019-08-01 22:29:00

Recently Reported IPs

46.129.31.46 208.1.178.173 33.226.213.219 106.58.182.218
125.250.194.255 160.76.206.233 226.74.99.22 195.88.113.80
34.39.124.214 14.15.67.215 37.32.150.139 79.33.127.249
4.236.196.41 158.118.96.102 68.58.213.181 218.228.17.179
28.146.138.67 177.104.208.26 240.54.155.153 41.188.42.205