Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Saint Paul

Region: Minnesota

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.192.148.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37733
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.192.148.245.		IN	A

;; AUTHORITY SECTION:
.			584	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110201 1800 900 604800 86400

;; Query time: 121 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 03 02:46:45 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 245.148.192.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 245.148.192.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
35.240.243.84 attackspam
Port Scan: TCP/443
2019-09-10 18:00:05
123.144.28.133 attackspam
Port Scan: TCP/23
2019-09-10 19:02:13
46.35.234.71 attackbots
Port Scan: TCP/443
2019-09-10 17:58:47
162.251.164.221 attack
Jul  9 04:07:41 mercury kernel: [UFW ALLOW] IN=eth0 OUT= MAC=f2:3c:91:bc:4d:f8:84:78:ac:0d:8f:41:08:00 SRC=162.251.164.221 DST=109.74.200.221 LEN=36 TOS=0x00 PREC=0x00 TTL=50 ID=0 DF PROTO=UDP SPT=51074 DPT=123 LEN=16 
...
2019-09-10 19:32:52
196.52.43.53 attackspambots
5061/tcp 110/tcp 9042/tcp...
[2019-07-11/09-10]71pkt,48pt.(tcp),5pt.(udp)
2019-09-10 18:06:58
42.4.126.20 attackspambots
Port Scan: TCP/23
2019-09-10 18:51:17
66.199.44.52 attackbotsspam
Port Scan: UDP/49153
2019-09-10 17:54:59
23.24.132.129 attackspam
Port Scan: UDP/120
2019-09-10 18:24:35
52.203.41.130 attackbotsspam
Port Scan: UDP/68
2019-09-10 18:49:50
67.250.27.54 attack
Port Scan: UDP/926
2019-09-10 19:11:33
35.198.126.31 attack
Port Scan: TCP/443
2019-09-10 18:51:58
209.235.67.49 attackspambots
Sep 10 01:25:23 eddieflores sshd\[9146\]: Invalid user test2 from 209.235.67.49
Sep 10 01:25:23 eddieflores sshd\[9146\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.235.67.49
Sep 10 01:25:25 eddieflores sshd\[9146\]: Failed password for invalid user test2 from 209.235.67.49 port 49461 ssh2
Sep 10 01:30:47 eddieflores sshd\[9611\]: Invalid user tester from 209.235.67.49
Sep 10 01:30:47 eddieflores sshd\[9611\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.235.67.49
2019-09-10 19:32:27
119.55.223.240 attackspam
Port Scan: TCP/23
2019-09-10 19:25:34
50.203.120.18 attackbotsspam
Port Scan: UDP/137
2019-09-10 17:58:09
73.12.231.210 attackspam
Port Scan: UDP/80
2019-09-10 19:09:21

Recently Reported IPs

75.20.222.20 86.234.228.46 146.37.72.198 212.177.95.173
99.213.113.198 188.190.70.233 145.227.32.106 61.167.222.198
68.85.118.112 35.147.14.215 219.100.237.22 226.63.144.60
98.33.190.62 146.237.243.11 2.178.227.148 148.60.178.240
182.190.178.159 2.50.168.87 206.253.179.22 94.80.139.191