Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
138.185.166.218 attack
spam
2020-04-15 16:02:51
138.185.166.133 attackspam
email spam
2020-03-01 19:46:06
138.185.166.254 attack
Sending SPAM email
2020-02-06 23:44:58
138.185.166.173 attackbotsspam
spam
2020-01-22 16:23:34
138.185.166.136 attackbots
Absender hat Spam-Falle ausgel?st
2019-12-19 16:15:01
138.185.166.194 attackspam
Brute force attempt
2019-08-15 05:13:26
138.185.166.166 attackspambots
Lines containing failures of 138.185.166.166
Jul 27 03:25:46 omfg postfix/smtpd[27121]: connect from unknown[138.185.166.166]
Jul x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=138.185.166.166
2019-07-29 08:50:12
138.185.166.149 attackspam
Jul 17 15:34:24 h2421860 postfix/postscreen[29334]: CONNECT from [138.185.166.149]:57743 to [85.214.119.52]:25
Jul 17 15:34:24 h2421860 postfix/dnsblog[29337]: addr 138.185.166.149 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Jul 17 15:34:24 h2421860 postfix/dnsblog[29338]: addr 138.185.166.149 listed by domain bl.spamcop.net as 127.0.0.2
Jul 17 15:34:24 h2421860 postfix/dnsblog[29338]: addr 138.185.166.149 listed by domain zen.spamhaus.org as 127.0.0.4
Jul 17 15:34:24 h2421860 postfix/dnsblog[29338]: addr 138.185.166.149 listed by domain zen.spamhaus.org as 127.0.0.3
Jul 17 15:34:24 h2421860 postfix/dnsblog[29342]: addr 138.185.166.149 listed by domain Unknown.trblspam.com as 185.53.179.7
Jul 17 15:34:24 h2421860 postfix/dnsblog[29339]: addr 138.185.166.149 listed by domain b.barracudacentral.org as 127.0.0.2
Jul 17 15:34:24 h2421860 postfix/dnsblog[29338]: addr 138.185.166.149 listed by domain dnsbl.sorbs.net as 127.0.0.6
Jul 17 15:34:24 h2421860 postfix/postscre........
-------------------------------
2019-07-18 18:23:59
138.185.166.194 attack
Jul 10 20:09:44 mxgate1 postfix/postscreen[26117]: CONNECT from [138.185.166.194]:49880 to [176.31.12.44]:25
Jul 10 20:09:44 mxgate1 postfix/dnsblog[26118]: addr 138.185.166.194 listed by domain zen.spamhaus.org as 127.0.0.4
Jul 10 20:09:44 mxgate1 postfix/dnsblog[26118]: addr 138.185.166.194 listed by domain zen.spamhaus.org as 127.0.0.3
Jul 10 20:09:44 mxgate1 postfix/dnsblog[26122]: addr 138.185.166.194 listed by domain cbl.abuseat.org as 127.0.0.2
Jul 10 20:09:44 mxgate1 postfix/dnsblog[26119]: addr 138.185.166.194 listed by domain bl.spamcop.net as 127.0.0.2
Jul 10 20:09:44 mxgate1 postfix/dnsblog[26121]: addr 138.185.166.194 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Jul 10 20:09:45 mxgate1 postfix/dnsblog[26166]: addr 138.185.166.194 listed by domain b.barracudacentral.org as 127.0.0.2
Jul 10 20:09:45 mxgate1 postfix/postscreen[26117]: PREGREET 38 after 0.53 from [138.185.166.194]:49880: EHLO ip138-185-166-194.netjat.com.br

Jul 10 20:09:45 mxgate1 postfix........
-------------------------------
2019-07-11 18:27:41
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.185.166.154
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62700
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.185.166.154.		IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 07:29:58 CST 2022
;; MSG SIZE  rcvd: 108
Host info
154.166.185.138.in-addr.arpa domain name pointer ip138-185-166-154.netjat.com.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
154.166.185.138.in-addr.arpa	name = ip138-185-166-154.netjat.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
112.85.42.185 attackspambots
[Block] Port Scanning | Rate: 10 hits/1hr
2020-04-20 00:28:28
163.172.127.251 attackspam
$f2bV_matches
2020-04-20 01:03:20
181.213.45.17 attack
Apr 19 18:44:08 pornomens sshd\[2354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.213.45.17  user=root
Apr 19 18:44:08 pornomens sshd\[2353\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.213.45.17  user=root
Apr 19 18:44:10 pornomens sshd\[2354\]: Failed password for root from 181.213.45.17 port 56192 ssh2
Apr 19 18:44:10 pornomens sshd\[2353\]: Failed password for root from 181.213.45.17 port 56191 ssh2
...
2020-04-20 00:52:52
81.213.152.3 attackspambots
Unauthorized connection attempt from IP address 81.213.152.3 on Port 445(SMB)
2020-04-20 00:32:49
188.32.93.101 attack
Unauthorized connection attempt from IP address 188.32.93.101 on Port 445(SMB)
2020-04-20 00:45:21
178.62.79.227 attackbots
Apr 19 15:47:37 ovpn sshd\[14142\]: Invalid user aa from 178.62.79.227
Apr 19 15:47:37 ovpn sshd\[14142\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.79.227
Apr 19 15:47:39 ovpn sshd\[14142\]: Failed password for invalid user aa from 178.62.79.227 port 47492 ssh2
Apr 19 16:02:07 ovpn sshd\[17494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.79.227  user=root
Apr 19 16:02:09 ovpn sshd\[17494\]: Failed password for root from 178.62.79.227 port 43108 ssh2
2020-04-20 00:43:22
95.217.38.235 attackspam
IDS admin
2020-04-20 00:38:13
113.185.46.109 attackbots
Unauthorized connection attempt from IP address 113.185.46.109 on Port 445(SMB)
2020-04-20 00:19:48
113.188.160.132 attackbotsspam
Unauthorized connection attempt from IP address 113.188.160.132 on Port 445(SMB)
2020-04-20 00:52:19
222.186.30.35 attackspambots
Apr 19 18:25:44 piServer sshd[12276]: Failed password for root from 222.186.30.35 port 28487 ssh2
Apr 19 18:25:47 piServer sshd[12276]: Failed password for root from 222.186.30.35 port 28487 ssh2
Apr 19 18:25:50 piServer sshd[12276]: Failed password for root from 222.186.30.35 port 28487 ssh2
...
2020-04-20 00:34:35
186.229.24.194 attackspam
Apr 19 18:41:01 vmd48417 sshd[10303]: Failed password for root from 186.229.24.194 port 7457 ssh2
2020-04-20 00:47:47
168.128.70.151 attackspambots
Apr 19 15:57:05 mail sshd[14621]: Invalid user cu from 168.128.70.151
Apr 19 15:57:05 mail sshd[14621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.128.70.151
Apr 19 15:57:05 mail sshd[14621]: Invalid user cu from 168.128.70.151
Apr 19 15:57:07 mail sshd[14621]: Failed password for invalid user cu from 168.128.70.151 port 47460 ssh2
Apr 19 17:01:41 mail sshd[23090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.128.70.151  user=root
Apr 19 17:01:43 mail sshd[23090]: Failed password for root from 168.128.70.151 port 40200 ssh2
...
2020-04-20 00:55:54
194.31.244.38 attackbotsspam
Port scan on 6 port(s): 2018 2027 2028 2035 2041 2049
2020-04-20 01:02:35
180.249.144.131 attackspam
Unauthorized connection attempt from IP address 180.249.144.131 on Port 445(SMB)
2020-04-20 00:28:09
218.78.91.140 attackspam
(sshd) Failed SSH login from 218.78.91.140 (CN/China/140.91.78.218.dial.xw.sh.dynamic.163data.com.cn): 3 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 19 11:27:46 andromeda sshd[17102]: Invalid user ag from 218.78.91.140 port 48718
Apr 19 11:27:48 andromeda sshd[17102]: Failed password for invalid user ag from 218.78.91.140 port 48718 ssh2
Apr 19 12:01:13 andromeda sshd[18329]: Invalid user vh from 218.78.91.140 port 54980
2020-04-20 00:44:50

Recently Reported IPs

138.185.166.152 138.185.166.158 138.185.166.156 138.185.166.162
138.185.166.164 138.185.166.160 138.185.166.167 138.185.166.172
138.185.166.168 138.185.166.170 138.185.166.174 118.175.169.238
138.185.166.176 138.185.166.178 138.185.166.179 118.175.169.24
138.185.166.184 138.185.166.186 138.185.166.180 138.185.166.182