Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: France

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.21.65.154
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49357
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.21.65.154.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030100 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 15:15:09 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 154.65.21.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 154.65.21.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
174.138.54.109 attackbots
174.138.54.109 - - [13/Nov/2019:11:28:54 +0100] "GET /wp-login.php HTTP/1.1" 200 1896 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
174.138.54.109 - - [13/Nov/2019:11:28:59 +0100] "POST /wp-login.php HTTP/1.1" 200 2294 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
174.138.54.109 - - [13/Nov/2019:11:28:59 +0100] "GET /wp-login.php HTTP/1.1" 200 1896 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
174.138.54.109 - - [13/Nov/2019:11:29:00 +0100] "POST /wp-login.php HTTP/1.1" 200 2268 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
174.138.54.109 - - [13/Nov/2019:11:29:05 +0100] "GET /wp-login.php HTTP/1.1" 200 1896 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
174.138.54.109 - - [13/Nov/2019:11:29:10 +0100] "POST /wp-login.php HTTP/1.1" 200 2269 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-11-13 19:26:22
134.209.9.244 attackspambots
WordPress wp-login brute force :: 134.209.9.244 0.116 - [13/Nov/2019:10:37:16  0000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 2043 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1"
2019-11-13 19:33:47
50.192.195.69 attack
Automatic report - Banned IP Access
2019-11-13 19:16:44
145.239.88.43 attackbotsspam
Nov 13 13:37:32 hosting sshd[487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.ip-145-239-88.eu  user=root
Nov 13 13:37:35 hosting sshd[487]: Failed password for root from 145.239.88.43 port 34108 ssh2
...
2019-11-13 19:33:03
178.165.129.108 attackbots
TCP Port Scanning
2019-11-13 19:14:31
159.203.169.16 attackspam
11/13/2019-05:24:54.436692 159.203.169.16 Protocol: 6 ET COMPROMISED Known Compromised or Hostile Host Traffic group 11
2019-11-13 19:14:15
73.152.7.88 attackspam
Unauthorised access (Nov 13) SRC=73.152.7.88 LEN=40 TOS=0x08 PREC=0x40 TTL=237 ID=3616 DF TCP DPT=23 WINDOW=14600 SYN
2019-11-13 19:37:19
218.56.138.164 attackspambots
2019-11-13T10:45:19.928447struts4.enskede.local sshd\[32092\]: Invalid user ivan from 218.56.138.164 port 51768
2019-11-13T10:45:19.939697struts4.enskede.local sshd\[32092\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.56.138.164
2019-11-13T10:45:23.926980struts4.enskede.local sshd\[32092\]: Failed password for invalid user ivan from 218.56.138.164 port 51768 ssh2
2019-11-13T10:49:58.537877struts4.enskede.local sshd\[32098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.56.138.164  user=root
2019-11-13T10:50:01.478790struts4.enskede.local sshd\[32098\]: Failed password for root from 218.56.138.164 port 58204 ssh2
...
2019-11-13 19:20:52
103.44.18.68 attackspambots
Nov 13 16:16:46 gw1 sshd[14989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.44.18.68
Nov 13 16:16:47 gw1 sshd[14989]: Failed password for invalid user andreia from 103.44.18.68 port 13669 ssh2
...
2019-11-13 19:36:47
123.18.135.165 attack
Automatic report - Port Scan Attack
2019-11-13 19:50:32
118.24.23.196 attackbots
Nov 13 11:43:40 MK-Soft-VM6 sshd[29020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.23.196 
Nov 13 11:43:42 MK-Soft-VM6 sshd[29020]: Failed password for invalid user mckenzie from 118.24.23.196 port 42486 ssh2
...
2019-11-13 19:27:11
189.41.210.138 attack
Automatic report - SSH Brute-Force Attack
2019-11-13 19:21:39
103.35.65.203 attackspambots
103.35.65.203 - - \[13/Nov/2019:11:55:28 +0100\] "POST /wp-login.php HTTP/1.0" 200 4404 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
103.35.65.203 - - \[13/Nov/2019:11:55:30 +0100\] "POST /wp-login.php HTTP/1.0" 200 4236 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
103.35.65.203 - - \[13/Nov/2019:11:55:32 +0100\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-13 19:39:10
210.1.31.106 attackspambots
Nov 13 01:22:47 web1 postfix/smtpd[18897]: warning: unknown[210.1.31.106]: SASL LOGIN authentication failed: authentication failure
...
2019-11-13 19:32:03
159.203.201.151 attack
" "
2019-11-13 19:32:15

Recently Reported IPs

39.192.246.160 216.183.224.90 242.156.253.38 86.178.240.16
93.70.170.134 87.230.245.249 145.24.29.127 128.122.58.170
146.128.62.137 52.81.3.150 133.95.56.58 94.249.232.250
32.127.255.146 227.64.194.122 230.47.238.169 222.83.249.196
109.73.101.74 226.28.173.190 200.89.70.211 169.157.48.47