Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Munich

Region: Bavaria

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.224.14.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13082
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.224.14.144.			IN	A

;; AUTHORITY SECTION:
.			349	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091902 1800 900 604800 86400

;; Query time: 104 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 20 04:37:38 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 144.14.224.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 144.14.224.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
35.221.15.252 attackspam
Port scan denied
2020-07-15 18:09:40
217.150.211.7 attack
Jul 15 01:22:11 XXX sshd[41604]: Invalid user concrete from 217.150.211.7 port 53894
2020-07-15 18:10:05
220.132.89.113 attackspambots
Honeypot attack, port: 81, PTR: 220-132-89-113.HINET-IP.hinet.net.
2020-07-15 18:17:15
222.247.69.45 attackspambots
"SERVER-WEBAPP GPON Router authentication bypass and command injection attempt"
2020-07-15 18:01:35
80.211.0.239 attackspambots
Jul 15 06:12:52 NPSTNNYC01T sshd[4478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.0.239
Jul 15 06:12:54 NPSTNNYC01T sshd[4478]: Failed password for invalid user gisela from 80.211.0.239 port 53952 ssh2
Jul 15 06:16:40 NPSTNNYC01T sshd[4863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.0.239
...
2020-07-15 18:29:16
120.70.98.132 attackspam
Invalid user scenes from 120.70.98.132 port 41075
2020-07-15 18:14:40
23.96.108.2 attackbotsspam
Jul 15 12:16:46 ns3164893 sshd[23162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.96.108.2
Jul 15 12:16:49 ns3164893 sshd[23162]: Failed password for invalid user admin from 23.96.108.2 port 61652 ssh2
...
2020-07-15 18:21:35
154.92.16.235 attackspam
Jul 15 11:32:29 server sshd[29125]: Failed password for invalid user loes from 154.92.16.235 port 34692 ssh2
Jul 15 11:35:42 server sshd[32594]: Failed password for invalid user wenhaoran from 154.92.16.235 port 32909 ssh2
Jul 15 11:38:53 server sshd[4010]: Failed password for invalid user guest from 154.92.16.235 port 59363 ssh2
2020-07-15 18:13:05
191.232.55.103 attackbots
Jul 15 11:53:19 jane sshd[27859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.232.55.103 
Jul 15 11:53:22 jane sshd[27859]: Failed password for invalid user admin from 191.232.55.103 port 53984 ssh2
...
2020-07-15 18:06:39
20.37.48.209 attackspambots
Banned for a week because repeated abuses, for example SSH, but not only
2020-07-15 18:23:09
203.202.249.83 attackbotsspam
Honeypot attack, port: 445, PTR: sanmar83.rad1.aamranetworks.com.
2020-07-15 18:18:47
52.186.25.97 attackspam
Jul 15 12:23:00 zooi sshd[18254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.186.25.97
Jul 15 12:23:03 zooi sshd[18254]: Failed password for invalid user admin from 52.186.25.97 port 27605 ssh2
...
2020-07-15 18:24:09
137.116.144.81 attack
Jul 15 09:44:15 marvibiene sshd[31150]: Invalid user admin from 137.116.144.81 port 59726
Jul 15 09:44:15 marvibiene sshd[31150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.116.144.81
Jul 15 09:44:15 marvibiene sshd[31150]: Invalid user admin from 137.116.144.81 port 59726
Jul 15 09:44:17 marvibiene sshd[31150]: Failed password for invalid user admin from 137.116.144.81 port 59726 ssh2
...
2020-07-15 18:02:49
52.187.53.102 attackspam
2020-07-15T12:16:47.2359311240 sshd\[22130\]: Invalid user admin from 52.187.53.102 port 57337
2020-07-15T12:16:47.2404821240 sshd\[22130\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.187.53.102
2020-07-15T12:16:49.1465391240 sshd\[22130\]: Failed password for invalid user admin from 52.187.53.102 port 57337 ssh2
...
2020-07-15 18:19:45
51.137.107.245 attack
Invalid user admin from 51.137.107.245 port 61305
2020-07-15 18:31:48

Recently Reported IPs

198.57.203.54 239.169.243.5 168.155.198.213 45.201.22.239
106.13.201.142 135.68.210.139 46.62.77.119 159.10.158.249
20.83.41.91 232.1.175.239 179.135.164.166 232.8.214.251
64.59.189.3 114.168.191.235 200.109.172.103 24.48.216.216
63.213.64.42 232.102.8.5 225.3.156.64 76.113.54.116