Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
138.201.55.51 attack
[munged]::443 138.201.55.51 - - [28/Sep/2019:16:51:56 +0200] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 138.201.55.51 - - [28/Sep/2019:16:52:28 +0200] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 138.201.55.51 - - [28/Sep/2019:16:53:00 +0200] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 138.201.55.51 - - [28/Sep/2019:16:53:31 +0200] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 138.201.55.51 - - [28/Sep/2019:16:54:03 +0200] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 138.201.55.51 - - [28/Sep/2019:16:54:35 +0200] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubun
2019-09-29 00:39:13
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.201.55.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1813
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.201.55.48.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021801 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 03:37:31 CST 2022
;; MSG SIZE  rcvd: 106
Host info
48.55.201.138.in-addr.arpa domain name pointer static.48.55.201.138.clients.your-server.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.55.201.138.in-addr.arpa	name = static.48.55.201.138.clients.your-server.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.186.173.226 attackbotsspam
Sep 13 00:50:42 vm1 sshd[28425]: Failed password for root from 222.186.173.226 port 17169 ssh2
Sep 13 00:50:55 vm1 sshd[28425]: error: maximum authentication attempts exceeded for root from 222.186.173.226 port 17169 ssh2 [preauth]
...
2020-09-13 06:52:08
45.84.196.236 attackspam
Sep 12 18:48:04 [host] kernel: [5595764.950057] [U
Sep 12 18:52:43 [host] kernel: [5596043.264304] [U
Sep 12 18:53:44 [host] kernel: [5596104.280079] [U
Sep 12 18:54:30 [host] kernel: [5596150.714742] [U
Sep 12 18:55:21 [host] kernel: [5596201.587268] [U
Sep 12 18:56:10 [host] kernel: [5596250.609131] [U
2020-09-13 06:57:32
183.82.121.34 attackspambots
Sep 13 05:21:11 itv-usvr-02 sshd[8331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.121.34  user=root
Sep 13 05:25:42 itv-usvr-02 sshd[8501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.121.34  user=root
Sep 13 05:30:05 itv-usvr-02 sshd[8702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.121.34
2020-09-13 06:59:36
217.23.2.182 attackspambots
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-09-12T20:41:48Z and 2020-09-12T21:36:20Z
2020-09-13 06:45:44
37.49.230.122 attackbots
Attempted to login using an invalid username
2020-09-13 06:36:33
182.74.25.246 attack
Sep 12 20:55:16 *** sshd[30510]: User root from 182.74.25.246 not allowed because not listed in AllowUsers
2020-09-13 06:52:30
27.116.255.153 attack
27.116.255.153 (KR/South Korea/-), 10 distributed imapd attacks on account [lisa.h@tehuruhi.school.nz] in the last 14400 secs; ID: DAN
2020-09-13 06:42:08
59.127.165.252 attackspambots
DATE:2020-09-12 18:55:19, IP:59.127.165.252, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-09-13 06:35:59
104.206.128.22 attackspam
 TCP (SYN) 104.206.128.22:50290 -> port 21, len 44
2020-09-13 07:03:04
40.77.167.98 attackspam
Automatic report - Banned IP Access
2020-09-13 06:54:27
125.16.205.18 attackspam
Sep 13 00:01:12 mavik sshd[2067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.16.205.18  user=root
Sep 13 00:01:14 mavik sshd[2067]: Failed password for root from 125.16.205.18 port 27905 ssh2
Sep 13 00:06:24 mavik sshd[2217]: Invalid user i from 125.16.205.18
Sep 13 00:06:24 mavik sshd[2217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.16.205.18
Sep 13 00:06:26 mavik sshd[2217]: Failed password for invalid user i from 125.16.205.18 port 21851 ssh2
...
2020-09-13 07:06:48
190.147.165.128 attack
Sep 12 18:51:31 vps647732 sshd[3013]: Failed password for root from 190.147.165.128 port 42922 ssh2
...
2020-09-13 07:00:59
112.85.42.238 attackspambots
Sep 13 00:52:44 piServer sshd[27745]: Failed password for root from 112.85.42.238 port 24264 ssh2
Sep 13 00:52:47 piServer sshd[27745]: Failed password for root from 112.85.42.238 port 24264 ssh2
Sep 13 00:52:49 piServer sshd[27745]: Failed password for root from 112.85.42.238 port 24264 ssh2
...
2020-09-13 07:03:20
112.85.42.181 attackbots
Sep 13 00:30:13 eventyay sshd[12799]: Failed password for root from 112.85.42.181 port 38245 ssh2
Sep 13 00:30:26 eventyay sshd[12799]: error: maximum authentication attempts exceeded for root from 112.85.42.181 port 38245 ssh2 [preauth]
Sep 13 00:30:41 eventyay sshd[12825]: Failed password for root from 112.85.42.181 port 19744 ssh2
...
2020-09-13 06:41:49
52.149.160.100 attackspam
Port Scan: TCP/443
2020-09-13 07:00:45

Recently Reported IPs

138.201.21.43 138.201.78.70 138.201.49.67 138.201.8.179
138.201.88.218 138.201.82.97 138.201.93.7 138.68.102.158
138.68.190.116 138.68.247.109 138.68.187.209 138.68.148.252
138.68.56.88 138.59.140.65 138.204.171.134 138.68.115.28
138.68.73.206 138.68.197.153 138.68.37.40 138.68.96.250