Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Alumine

Region: Neuquen

Country: Argentina

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.219.233.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3992
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.219.233.148.		IN	A

;; AUTHORITY SECTION:
.			554	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020031501 1800 900 604800 86400

;; Query time: 104 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 16 04:47:48 CST 2020
;; MSG SIZE  rcvd: 119
Host info
148.233.219.138.in-addr.arpa domain name pointer host-138.219.233.148.fronteradigital.net.ar.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
148.233.219.138.in-addr.arpa	name = host-138.219.233.148.fronteradigital.net.ar.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.158.124.35 attackspam
Jun 25 06:51:51 Tower sshd[26501]: Connection from 51.158.124.35 port 56038 on 192.168.10.220 port 22
Jun 25 06:51:52 Tower sshd[26501]: Invalid user uploader from 51.158.124.35 port 56038
Jun 25 06:51:52 Tower sshd[26501]: error: Could not get shadow information for NOUSER
Jun 25 06:51:52 Tower sshd[26501]: Failed password for invalid user uploader from 51.158.124.35 port 56038 ssh2
Jun 25 06:51:52 Tower sshd[26501]: Received disconnect from 51.158.124.35 port 56038:11: Bye Bye [preauth]
Jun 25 06:51:52 Tower sshd[26501]: Disconnected from invalid user uploader 51.158.124.35 port 56038 [preauth]
2019-06-25 19:06:15
117.254.36.187 attack
Unauthorized connection attempt from IP address 117.254.36.187 on Port 445(SMB)
2019-06-25 19:55:35
54.36.149.107 attack
Automatic report - Web App Attack
2019-06-25 19:17:17
113.173.246.246 attackspambots
Port scan on 1 port(s): 9527
2019-06-25 19:10:37
174.138.77.106 attack
25.06.2019 12:19:24 - Wordpress fail 
Detected by ELinOX-ALM
2019-06-25 19:32:20
159.65.112.93 attackspam
Jun 25 13:12:06 tanzim-HP-Z238-Microtower-Workstation sshd\[3392\]: Invalid user lamarche from 159.65.112.93
Jun 25 13:12:06 tanzim-HP-Z238-Microtower-Workstation sshd\[3392\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.112.93
Jun 25 13:12:09 tanzim-HP-Z238-Microtower-Workstation sshd\[3392\]: Failed password for invalid user lamarche from 159.65.112.93 port 40126 ssh2
...
2019-06-25 19:36:13
54.38.82.14 attackbotsspam
Jun 25 06:40:28 vps200512 sshd\[18677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14  user=root
Jun 25 06:40:30 vps200512 sshd\[18677\]: Failed password for root from 54.38.82.14 port 43934 ssh2
Jun 25 06:40:30 vps200512 sshd\[18679\]: Invalid user admin from 54.38.82.14
Jun 25 06:40:30 vps200512 sshd\[18679\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14
Jun 25 06:40:32 vps200512 sshd\[18679\]: Failed password for invalid user admin from 54.38.82.14 port 56632 ssh2
2019-06-25 18:59:36
107.170.196.202 attackbots
25.06.2019 06:58:06 Connection to port 26389 blocked by firewall
2019-06-25 19:27:09
123.231.12.221 attackbots
Jun 25 08:56:56 ovpn sshd\[3582\]: Invalid user test from 123.231.12.221
Jun 25 08:56:56 ovpn sshd\[3582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.231.12.221
Jun 25 08:56:58 ovpn sshd\[3582\]: Failed password for invalid user test from 123.231.12.221 port 57898 ssh2
Jun 25 08:59:34 ovpn sshd\[3652\]: Invalid user judge from 123.231.12.221
Jun 25 08:59:34 ovpn sshd\[3652\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.231.12.221
2019-06-25 18:56:50
123.108.99.70 attackbots
Unauthorized connection attempt from IP address 123.108.99.70 on Port 445(SMB)
2019-06-25 19:47:35
120.136.26.240 attackbotsspam
Jun 25 08:58:08 rpi sshd\[16538\]: Invalid user jira from 120.136.26.240 port 27971
Jun 25 08:58:08 rpi sshd\[16538\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.136.26.240
Jun 25 08:58:10 rpi sshd\[16538\]: Failed password for invalid user jira from 120.136.26.240 port 27971 ssh2
2019-06-25 19:25:36
111.230.13.186 attackbots
Jun 25 07:42:37 mail sshd\[3649\]: Failed password for invalid user test from 111.230.13.186 port 55734 ssh2
Jun 25 07:58:55 mail sshd\[3705\]: Invalid user nagios from 111.230.13.186 port 33036
Jun 25 07:58:55 mail sshd\[3705\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.13.186
...
2019-06-25 18:58:09
66.214.40.126 attackspam
Jun 25 08:58:45 ns41 sshd[4179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.214.40.126
Jun 25 08:58:46 ns41 sshd[4181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.214.40.126
Jun 25 08:58:47 ns41 sshd[4179]: Failed password for invalid user pi from 66.214.40.126 port 34184 ssh2
2019-06-25 19:13:47
216.161.217.38 attackbots
Unauthorised access (Jun 25) SRC=216.161.217.38 LEN=44 TTL=237 ID=60325 DF TCP DPT=23 WINDOW=14600 SYN
2019-06-25 19:48:28
185.220.70.133 attack
Brute forcing RDP port 3389
2019-06-25 19:40:57

Recently Reported IPs

130.246.7.8 174.201.49.45 51.218.64.59 84.47.3.141
72.90.218.146 14.45.122.231 45.16.191.227 186.52.99.120
64.228.16.199 184.251.119.12 174.200.130.60 191.193.177.252
36.17.13.248 128.194.10.129 93.248.72.214 186.21.56.107
45.161.46.16 60.92.212.188 41.89.28.236 121.21.170.52