Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.244.124.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64407
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.244.124.16.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 21:59:46 CST 2025
;; MSG SIZE  rcvd: 107
Host info
16.124.244.138.in-addr.arpa domain name pointer mvpmweb1.mpk.med.uni-muenchen.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
16.124.244.138.in-addr.arpa	name = mvpmweb1.mpk.med.uni-muenchen.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
180.252.22.214 attack
Unauthorized connection attempt from IP address 180.252.22.214 on Port 445(SMB)
2019-11-11 08:06:09
123.135.127.85 attackbots
123.135.127.85 was recorded 5 times by 5 hosts attempting to connect to the following ports: 5499,1689. Incident counter (4h, 24h, all-time): 5, 44, 260
2019-11-11 08:22:49
222.186.175.182 attackbotsspam
Nov 11 01:00:37 meumeu sshd[15932]: Failed password for root from 222.186.175.182 port 23112 ssh2
Nov 11 01:00:53 meumeu sshd[15932]: error: maximum authentication attempts exceeded for root from 222.186.175.182 port 23112 ssh2 [preauth]
Nov 11 01:00:59 meumeu sshd[15967]: Failed password for root from 222.186.175.182 port 57404 ssh2
...
2019-11-11 08:12:10
202.179.17.7 attackbots
Unauthorized connection attempt from IP address 202.179.17.7 on Port 445(SMB)
2019-11-11 07:46:23
5.1.55.188 attack
Unauthorized connection attempt from IP address 5.1.55.188 on Port 445(SMB)
2019-11-11 07:58:55
119.109.171.146 attack
firewall-block, port(s): 23/tcp
2019-11-11 07:58:06
150.107.140.78 attack
Unauthorized connection attempt from IP address 150.107.140.78 on Port 445(SMB)
2019-11-11 08:17:17
106.13.13.122 attackspambots
Nov 10 19:13:49 ny01 sshd[19973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.13.122
Nov 10 19:13:51 ny01 sshd[19973]: Failed password for invalid user bruscino from 106.13.13.122 port 35326 ssh2
Nov 10 19:18:22 ny01 sshd[20421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.13.122
2019-11-11 08:21:41
217.197.251.252 attack
Unauthorized connection attempt from IP address 217.197.251.252 on Port 445(SMB)
2019-11-11 07:48:03
77.81.230.143 attack
Nov 11 01:00:28 mail sshd\[8504\]: Invalid user rpc from 77.81.230.143
Nov 11 01:00:28 mail sshd\[8504\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.81.230.143
Nov 11 01:00:30 mail sshd\[8504\]: Failed password for invalid user rpc from 77.81.230.143 port 34224 ssh2
...
2019-11-11 08:06:30
125.70.111.182 attackspambots
Unauthorised access (Nov 11) SRC=125.70.111.182 LEN=44 TTL=240 ID=59821 TCP DPT=1433 WINDOW=1024 SYN
2019-11-11 08:14:33
149.56.89.123 attackbots
Nov 11 00:52:35 SilenceServices sshd[19904]: Failed password for root from 149.56.89.123 port 52380 ssh2
Nov 11 01:00:55 SilenceServices sshd[25376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.89.123
Nov 11 01:00:58 SilenceServices sshd[25376]: Failed password for invalid user rensink from 149.56.89.123 port 42392 ssh2
2019-11-11 08:12:41
182.71.188.10 attackspam
$f2bV_matches
2019-11-11 07:52:36
51.91.193.116 attackbotsspam
Nov 10 19:38:19 nextcloud sshd\[27669\]: Invalid user dekri from 51.91.193.116
Nov 10 19:38:19 nextcloud sshd\[27669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.193.116
Nov 10 19:38:20 nextcloud sshd\[27669\]: Failed password for invalid user dekri from 51.91.193.116 port 51672 ssh2
...
2019-11-11 07:53:45
183.82.1.60 attack
Unauthorized connection attempt from IP address 183.82.1.60 on Port 445(SMB)
2019-11-11 08:08:52

Recently Reported IPs

223.109.184.209 241.193.171.17 30.211.113.56 87.200.166.118
133.144.99.160 196.198.10.255 153.225.103.231 89.25.215.19
167.84.83.158 163.164.138.242 194.3.240.43 46.191.37.205
133.255.118.5 148.249.189.98 60.8.59.42 65.229.87.244
132.102.241.184 30.190.32.228 8.22.191.96 231.79.54.80