Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Central

Region: Central and Western District

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: Hong Kong Broadband Network Ltd.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.19.230.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35181
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.19.230.148.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061200 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 12 21:57:03 CST 2019
;; MSG SIZE  rcvd: 118

Host info
148.230.19.138.in-addr.arpa domain name pointer 138019230148.ctinets.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
148.230.19.138.in-addr.arpa	name = 138019230148.ctinets.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
222.186.15.31 attack
2020-01-01T03:47:32.349304gehlen.rc.princeton.edu sshd[10297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.31  user=r.r
2020-01-01T03:47:34.926084gehlen.rc.princeton.edu sshd[10297]: Failed password for r.r from 222.186.15.31 port 63738 ssh2
2020-01-01T03:47:36.485436gehlen.rc.princeton.edu sshd[10297]: Failed password for r.r from 222.186.15.31 port 63738 ssh2
2020-01-01T03:47:32.349304gehlen.rc.princeton.edu sshd[10297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.31  user=r.r
2020-01-01T03:47:34.926084gehlen.rc.princeton.edu sshd[10297]: Failed password for r.r from 222.186.15.31 port 63738 ssh2
2020-01-01T03:47:36.485436gehlen.rc.princeton.edu sshd[10297]: Failed password for r.r from 222.186.15.31 port 63738 ssh2
2020-01-01T03:47:32.349304gehlen.rc.princeton.edu sshd[10297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rh........
------------------------------
2020-01-04 07:51:29
106.13.138.3 attackbots
Jan  4 00:25:54 ArkNodeAT sshd\[30113\]: Invalid user maverick from 106.13.138.3
Jan  4 00:25:54 ArkNodeAT sshd\[30113\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.138.3
Jan  4 00:25:56 ArkNodeAT sshd\[30113\]: Failed password for invalid user maverick from 106.13.138.3 port 41472 ssh2
2020-01-04 07:29:15
118.193.31.180 attackbotsspam
Unauthorized connection attempt detected from IP address 118.193.31.180 to port 515
2020-01-04 08:04:06
113.128.105.203 attackspam
Unauthorized connection attempt detected from IP address 113.128.105.203 to port 8118
2020-01-04 08:05:42
220.200.164.19 attack
Unauthorized connection attempt detected from IP address 220.200.164.19 to port 8899
2020-01-04 07:53:06
124.90.55.150 attack
Unauthorized connection attempt detected from IP address 124.90.55.150 to port 8118
2020-01-04 08:00:11
179.104.42.21 attack
Brute force SMTP login attempts.
2020-01-04 07:39:24
119.65.57.252 attack
Unauthorized connection attempt detected from IP address 119.65.57.252 to port 5555
2020-01-04 07:44:32
211.154.194.35 attack
Unauthorized connection attempt detected from IP address 211.154.194.35 to port 1433
2020-01-04 07:54:16
50.205.224.51 attack
Unauthorized connection attempt detected from IP address 50.205.224.51 to port 8000
2020-01-04 07:47:09
175.184.166.10 attackbots
Unauthorized connection attempt detected from IP address 175.184.166.10 to port 443
2020-01-04 07:42:34
42.237.24.216 attackspambots
23/tcp
[2020-01-03]1pkt
2020-01-04 07:47:38
115.52.48.211 attackspambots
Unauthorized connection attempt detected from IP address 115.52.48.211 to port 23
2020-01-04 08:05:13
91.193.107.58 attackspam
Jan  3 18:21:47 vps46666688 sshd[554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.193.107.58
Jan  3 18:21:49 vps46666688 sshd[554]: Failed password for invalid user sqy from 91.193.107.58 port 38756 ssh2
...
2020-01-04 07:33:28
210.22.82.231 attack
port scan and connect, tcp 23 (telnet)
2020-01-04 07:54:32

Recently Reported IPs

97.113.234.164 204.190.33.111 203.154.78.176 204.15.240.74
195.32.166.50 91.110.163.177 123.61.109.100 182.176.161.14
124.49.220.34 228.16.221.30 75.253.201.212 70.184.236.209
182.102.8.109 208.178.224.170 138.0.7.242 118.163.95.111
25.22.118.145 0.149.7.238 141.98.81.34 212.17.9.225