Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Saint Paul

Region: Minnesota

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.192.42.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48296
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.192.42.18.			IN	A

;; AUTHORITY SECTION:
.			341	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020021501 1800 900 604800 86400

;; Query time: 144 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 06:06:18 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 18.42.192.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 18.42.192.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
183.109.79.253 attackspambots
Jul 27 06:55:17 onepixel sshd[2631853]: Invalid user kadri from 183.109.79.253 port 62188
Jul 27 06:55:17 onepixel sshd[2631853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.109.79.253 
Jul 27 06:55:17 onepixel sshd[2631853]: Invalid user kadri from 183.109.79.253 port 62188
Jul 27 06:55:19 onepixel sshd[2631853]: Failed password for invalid user kadri from 183.109.79.253 port 62188 ssh2
Jul 27 06:59:34 onepixel sshd[2634208]: Invalid user greg from 183.109.79.253 port 62655
2020-07-27 15:13:42
112.35.62.225 attackbots
2020-07-27T05:53:57+0200 Failed SSH Authentication/Brute Force Attack. (Server 10)
2020-07-27 14:52:40
185.89.36.2 attack
Port scan on 1 port(s): 81
2020-07-27 14:48:42
178.32.221.225 attack
Invalid user franz from 178.32.221.225 port 55466
2020-07-27 15:14:04
129.211.146.50 attack
Invalid user caroline from 129.211.146.50 port 50932
2020-07-27 15:10:44
187.176.185.65 attackspambots
Fail2Ban Ban Triggered
2020-07-27 15:13:22
45.129.33.9 attackbotsspam
Fail2Ban Ban Triggered
2020-07-27 15:07:42
219.75.134.27 attackspam
wp BF attempts
2020-07-27 14:43:02
201.171.19.106 attackbots
Automatic report - XMLRPC Attack
2020-07-27 15:00:54
188.234.247.110 attackspam
2020-07-27T06:17:55.333895randservbullet-proofcloud-66.localdomain sshd[16816]: Invalid user i686 from 188.234.247.110 port 45912
2020-07-27T06:17:55.338307randservbullet-proofcloud-66.localdomain sshd[16816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.234.247.110
2020-07-27T06:17:55.333895randservbullet-proofcloud-66.localdomain sshd[16816]: Invalid user i686 from 188.234.247.110 port 45912
2020-07-27T06:17:57.293677randservbullet-proofcloud-66.localdomain sshd[16816]: Failed password for invalid user i686 from 188.234.247.110 port 45912 ssh2
...
2020-07-27 14:56:19
46.101.61.207 attack
46.101.61.207 - - [27/Jul/2020:08:09:23 +0200] "GET /wp-login.php HTTP/1.1" 200 6310 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
46.101.61.207 - - [27/Jul/2020:08:09:26 +0200] "POST /wp-login.php HTTP/1.1" 200 6561 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
46.101.61.207 - - [27/Jul/2020:08:09:28 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-07-27 14:36:17
167.172.241.91 attackspambots
Invalid user agostino from 167.172.241.91 port 53146
2020-07-27 14:36:54
157.230.153.203 attack
157.230.153.203 - - [27/Jul/2020:06:47:46 +0100] "POST /wp-login.php HTTP/1.1" 200 2183 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.230.153.203 - - [27/Jul/2020:06:47:49 +0100] "POST /wp-login.php HTTP/1.1" 200 2159 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.230.153.203 - - [27/Jul/2020:06:47:49 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-27 14:54:30
59.41.93.5 attack
Jul 27 06:50:14 mail sshd[23617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.41.93.5
Jul 27 06:50:16 mail sshd[23617]: Failed password for invalid user ftpuser from 59.41.93.5 port 8106 ssh2
...
2020-07-27 14:47:59
94.102.51.28 attackspam
Jul 27 08:07:04 [host] kernel: [1497278.447878] [U
Jul 27 08:11:17 [host] kernel: [1497531.827555] [U
Jul 27 08:12:51 [host] kernel: [1497625.422648] [U
Jul 27 08:14:16 [host] kernel: [1497710.450916] [U
Jul 27 08:18:09 [host] kernel: [1497943.507062] [U
Jul 27 08:33:36 [host] kernel: [1498870.096733] [U
2020-07-27 14:37:25

Recently Reported IPs

119.199.202.127 81.183.245.25 177.245.120.152 39.95.43.96
175.87.203.205 23.101.113.248 110.152.46.183 104.197.121.175
145.33.48.84 120.103.178.208 216.102.215.95 89.1.73.182
104.32.13.230 105.89.46.32 187.34.255.213 203.39.196.127
118.37.162.126 64.178.10.117 166.102.226.140 170.52.15.129