Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.226.118.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57282
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.226.118.3.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021101 1800 900 604800 86400

;; Query time: 47 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 03:37:05 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 3.118.226.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 3.118.226.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.55.86.19 attack
Invalid user vmaloba from 45.55.86.19 port 42389
2019-10-18 07:07:37
85.167.58.102 attackspam
Oct 17 12:36:42 hanapaa sshd\[7195\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ti0020a400-2140.bb.online.no  user=root
Oct 17 12:36:45 hanapaa sshd\[7195\]: Failed password for root from 85.167.58.102 port 43364 ssh2
Oct 17 12:43:43 hanapaa sshd\[7877\]: Invalid user deploy from 85.167.58.102
Oct 17 12:43:43 hanapaa sshd\[7877\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ti0020a400-2140.bb.online.no
Oct 17 12:43:45 hanapaa sshd\[7877\]: Failed password for invalid user deploy from 85.167.58.102 port 54936 ssh2
2019-10-18 06:55:39
218.104.231.2 attackbotsspam
Oct 17 18:37:09 TORMINT sshd\[30163\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.104.231.2  user=root
Oct 17 18:37:11 TORMINT sshd\[30163\]: Failed password for root from 218.104.231.2 port 50401 ssh2
Oct 17 18:41:48 TORMINT sshd\[31532\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.104.231.2  user=root
...
2019-10-18 06:58:26
189.109.247.149 attack
2019-10-17T23:05:15.402428abusebot.cloudsearch.cf sshd\[2414\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.109.247.149  user=root
2019-10-18 07:21:30
145.239.10.217 attackspam
$f2bV_matches
2019-10-18 06:53:29
201.163.91.166 attackbots
Jan 19 07:33:24 odroid64 sshd\[29563\]: User sshd from 201.163.91.166 not allowed because not listed in AllowUsers
Jan 19 07:33:24 odroid64 sshd\[29563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.163.91.166  user=sshd
Jan 19 07:33:27 odroid64 sshd\[29563\]: Failed password for invalid user sshd from 201.163.91.166 port 58456 ssh2
Jan 28 17:06:53 odroid64 sshd\[31157\]: Invalid user gpadmin from 201.163.91.166
Jan 28 17:06:53 odroid64 sshd\[31157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.163.91.166
Jan 28 17:06:55 odroid64 sshd\[31157\]: Failed password for invalid user gpadmin from 201.163.91.166 port 56064 ssh2
Feb 22 07:45:36 odroid64 sshd\[11530\]: Invalid user webadmin from 201.163.91.166
Feb 22 07:45:36 odroid64 sshd\[11530\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.163.91.166
Feb 22 07:45:38 odroid64 sshd\[11530\]: Fa
...
2019-10-18 06:53:16
121.173.65.189 attackbots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/121.173.65.189/ 
 KR - 1H : (66)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : KR 
 NAME ASN : ASN4766 
 
 IP : 121.173.65.189 
 
 CIDR : 121.173.0.0/16 
 
 PREFIX COUNT : 8136 
 
 UNIQUE IP COUNT : 44725248 
 
 
 WYKRYTE ATAKI Z ASN4766 :  
  1H - 3 
  3H - 6 
  6H - 10 
 12H - 22 
 24H - 45 
 
 DateTime : 2019-10-17 21:49:48 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-18 07:16:51
206.189.202.45 attackspam
Oct 17 21:31:59 web8 sshd\[18775\]: Invalid user cx123 from 206.189.202.45
Oct 17 21:31:59 web8 sshd\[18775\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.202.45
Oct 17 21:32:01 web8 sshd\[18775\]: Failed password for invalid user cx123 from 206.189.202.45 port 35898 ssh2
Oct 17 21:35:55 web8 sshd\[20633\]: Invalid user 1qaz2wsx from 206.189.202.45
Oct 17 21:35:55 web8 sshd\[20633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.202.45
2019-10-18 06:48:19
201.16.247.140 attack
Jan 26 05:28:42 odroid64 sshd\[9665\]: Invalid user m1 from 201.16.247.140
Jan 26 05:28:42 odroid64 sshd\[9665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.16.247.140
Jan 26 05:28:44 odroid64 sshd\[9665\]: Failed password for invalid user m1 from 201.16.247.140 port 46746 ssh2
Mar 10 03:52:56 odroid64 sshd\[15850\]: Invalid user armod from 201.16.247.140
Mar 10 03:52:56 odroid64 sshd\[15850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.16.247.140
Mar 10 03:52:57 odroid64 sshd\[15850\]: Failed password for invalid user armod from 201.16.247.140 port 37820 ssh2
Mar 21 04:58:18 odroid64 sshd\[30900\]: Invalid user server from 201.16.247.140
Mar 21 04:58:18 odroid64 sshd\[30900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.16.247.140
Mar 21 04:58:19 odroid64 sshd\[30900\]: Failed password for invalid user server from 201.16.247.140 por
...
2019-10-18 07:10:02
49.235.84.51 attackspam
Oct 18 00:43:09 MK-Soft-VM7 sshd[9967]: Failed password for root from 49.235.84.51 port 42552 ssh2
...
2019-10-18 06:53:55
201.163.91.164 attackspambots
Jan 14 02:43:11 odroid64 sshd\[3561\]: Invalid user or from 201.163.91.164
Jan 14 02:43:11 odroid64 sshd\[3561\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.163.91.164
Jan 14 02:43:13 odroid64 sshd\[3561\]: Failed password for invalid user or from 201.163.91.164 port 54448 ssh2
Feb 24 17:29:08 odroid64 sshd\[28477\]: Invalid user test1 from 201.163.91.164
Feb 24 17:29:09 odroid64 sshd\[28477\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.163.91.164
Feb 24 17:29:10 odroid64 sshd\[28477\]: Failed password for invalid user test1 from 201.163.91.164 port 58000 ssh2
Mar  1 00:09:37 odroid64 sshd\[12355\]: Invalid user sa from 201.163.91.164
Mar  1 00:09:37 odroid64 sshd\[12355\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.163.91.164
Mar  1 00:09:39 odroid64 sshd\[12355\]: Failed password for invalid user sa from 201.163.91.164 port 60116 
...
2019-10-18 06:55:08
149.202.144.181 attack
Lines containing failures of 149.202.144.181
Oct 17 21:26:40 shared05 sshd[16194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.144.181  user=r.r
Oct 17 21:26:42 shared05 sshd[16194]: Failed password for r.r from 149.202.144.181 port 57948 ssh2
Oct 17 21:26:42 shared05 sshd[16194]: Received disconnect from 149.202.144.181 port 57948:11: Bye Bye [preauth]
Oct 17 21:26:42 shared05 sshd[16194]: Disconnected from authenticating user r.r 149.202.144.181 port 57948 [preauth]
Oct 17 21:33:16 shared05 sshd[17871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.144.181  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=149.202.144.181
2019-10-18 06:50:35
154.92.195.9 attackspam
2019-10-17T22:39:32.419294abusebot-6.cloudsearch.cf sshd\[322\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.92.195.9  user=root
2019-10-18 06:56:29
51.38.95.12 attackbotsspam
Oct 17 23:48:29 server sshd\[27315\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip12.ip-51-38-95.eu  user=root
Oct 17 23:48:30 server sshd\[27315\]: Failed password for root from 51.38.95.12 port 55504 ssh2
Oct 17 23:52:37 server sshd\[28522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip12.ip-51-38-95.eu  user=root
Oct 17 23:52:39 server sshd\[28522\]: Failed password for root from 51.38.95.12 port 41860 ssh2
Oct 17 23:56:06 server sshd\[29589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip12.ip-51-38-95.eu  user=root
...
2019-10-18 06:49:38
140.143.164.33 attackspambots
Automatic report - Banned IP Access
2019-10-18 07:13:17

Recently Reported IPs

36.120.117.27 255.229.255.91 243.161.66.61 120.120.29.84
229.244.248.203 67.11.68.217 142.253.130.29 207.183.103.225
93.172.186.224 151.166.212.168 195.185.59.242 156.186.249.83
180.27.65.164 245.90.156.116 115.200.181.214 72.26.110.92
38.177.98.97 190.94.214.214 139.30.78.208 3.82.168.45