Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Munich

Region: Bayern

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
138.246.253.15 attackspam
8 web app probes over 24 hour period.
2020-09-25 10:34:17
138.246.253.15 attackbots
CF RAY ID: 5ccfd7a5f8c6eda7 IP Class: unknown URI: /
2020-09-04 04:21:27
138.246.253.15 attack
Unauthorized connection attempt detected from IP address 138.246.253.15 to port 443 [T]
2020-09-03 20:03:51
138.246.253.7 attackbotsspam
 TCP (SYN) 138.246.253.7:49295 -> port 53, len 40
2020-08-13 01:56:06
138.246.253.15 attackbotsspam
CF RAY ID: 5be922ac2e11d44f IP Class: unknown URI: /
2020-08-06 23:50:03
138.246.253.15 attackspambots
Unauthorized connection attempt detected from IP address 138.246.253.15 to port 443
2020-06-24 00:44:02
138.246.253.15 attackspambots
138.246.253.15 - - [14/Apr/2020:15:20:12 +0200] "HEAD / HTTP/1.1" 400 3592 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.85 Safari/537.36"
2020-04-14 23:19:21
138.246.253.21 attackspambots
Port scan on 1 port(s): 53
2020-04-08 05:41:02
138.246.253.21 attack
Port scan on 1 port(s): 53
2020-03-31 23:58:37
138.246.253.5 attackspam
From CCTV User Interface Log
...::ffff:138.246.253.5 - - [20/Mar/2020:09:06:43 +0000] "-" 400 179
...
2020-03-21 04:04:27
138.246.253.15 attackbotsspam
port scan and connect, tcp 443 (https)
2020-03-05 15:32:29
138.246.253.5 attack
138.246.253.5 - - [23/Feb/2020:12:13:07 -0500] "HEAD / HTTP/1.1" 500 - "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.85 Safari/537.36"
2020-02-24 05:41:47
138.246.253.10 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-19 22:38:30
138.246.253.21 attack
Port scan on 1 port(s): 53
2020-02-13 23:20:48
138.246.253.21 attack
Port scan on 1 port(s): 53
2020-01-20 15:52:05
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.246.2.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45599
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.246.2.106.			IN	A

;; AUTHORITY SECTION:
.			344	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051500 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 15 16:03:52 CST 2023
;; MSG SIZE  rcvd: 106
Host info
106.2.246.138.in-addr.arpa domain name pointer host106-2.natpool.mwn.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
106.2.246.138.in-addr.arpa	name = host106-2.natpool.mwn.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
92.63.194.76 attackbots
Unauthorized connection attempt detected from IP address 92.63.194.76 to port 5900 [T]
2020-05-06 17:01:08
191.234.162.169 attackbots
May  6 08:50:56 ovpn sshd\[10918\]: Invalid user ratna from 191.234.162.169
May  6 08:50:56 ovpn sshd\[10918\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.234.162.169
May  6 08:50:57 ovpn sshd\[10918\]: Failed password for invalid user ratna from 191.234.162.169 port 35202 ssh2
May  6 08:56:39 ovpn sshd\[12298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.234.162.169  user=root
May  6 08:56:42 ovpn sshd\[12298\]: Failed password for root from 191.234.162.169 port 45796 ssh2
2020-05-06 16:46:05
186.211.16.250 attackspam
20/5/6@01:13:57: FAIL: Alarm-Network address from=186.211.16.250
20/5/6@01:13:57: FAIL: Alarm-Network address from=186.211.16.250
...
2020-05-06 16:40:38
45.249.95.8 attackbots
fail2ban -- 45.249.95.8
...
2020-05-06 16:32:46
111.229.249.147 attack
$f2bV_matches
2020-05-06 16:42:00
159.89.171.81 attack
May  6 09:31:18 rotator sshd\[19903\]: Invalid user user7 from 159.89.171.81May  6 09:31:20 rotator sshd\[19903\]: Failed password for invalid user user7 from 159.89.171.81 port 49318 ssh2May  6 09:35:38 rotator sshd\[20678\]: Invalid user sl from 159.89.171.81May  6 09:35:40 rotator sshd\[20678\]: Failed password for invalid user sl from 159.89.171.81 port 59422 ssh2May  6 09:40:05 rotator sshd\[20805\]: Invalid user zy from 159.89.171.81May  6 09:40:06 rotator sshd\[20805\]: Failed password for invalid user zy from 159.89.171.81 port 41294 ssh2
...
2020-05-06 16:48:59
112.85.42.188 attack
sshd jail - ssh hack attempt
2020-05-06 16:50:04
187.174.149.2 attackspambots
May  6 08:32:53 mail.srvfarm.net postfix/smtpd[197295]: warning: unknown[187.174.149.2]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May  6 08:32:53 mail.srvfarm.net postfix/smtpd[197295]: lost connection after AUTH from unknown[187.174.149.2]
May  6 08:33:23 mail.srvfarm.net postfix/smtpd[197294]: warning: unknown[187.174.149.2]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May  6 08:33:23 mail.srvfarm.net postfix/smtpd[197294]: lost connection after AUTH from unknown[187.174.149.2]
May  6 08:37:59 mail.srvfarm.net postfix/smtpd[196722]: warning: unknown[187.174.149.2]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-05-06 16:51:08
187.188.236.198 attack
" "
2020-05-06 16:34:28
125.212.207.205 attack
$f2bV_matches
2020-05-06 16:29:27
152.136.219.175 attackbots
May  6 05:51:27 vps639187 sshd\[24346\]: Invalid user liming from 152.136.219.175 port 59762
May  6 05:51:27 vps639187 sshd\[24346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.219.175
May  6 05:51:30 vps639187 sshd\[24346\]: Failed password for invalid user liming from 152.136.219.175 port 59762 ssh2
...
2020-05-06 16:39:35
220.117.115.10 attackbots
SSH Brute-Force Attack
2020-05-06 16:25:37
5.44.169.25 attackspam
Port probing on unauthorized port 445
2020-05-06 16:23:16
124.251.38.143 attackbotsspam
May  6 06:25:27 host sshd[4660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.251.38.143  user=root
May  6 06:25:29 host sshd[4660]: Failed password for root from 124.251.38.143 port 34878 ssh2
...
2020-05-06 16:46:56
113.21.115.73 attackspambots
2020-05-0606:13:301jWBR3-0006qy-0v\<=info@whatsup2013.chH=\(localhost\)[113.21.115.73]:33247P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3108id=8eea5a8982a97c8fac52a4f7fc28113d1ef4073c41@whatsup2013.chT="Youarerightfrommydream"forasmith1044@aol.comdcs4595@gmail.com2020-05-0606:14:081jWBRd-0006sI-1e\<=info@whatsup2013.chH=\(localhost\)[113.172.126.90]:56538P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3075id=85d0da8982a97c705712a4f703c4cec2f1782815@whatsup2013.chT="Iwouldliketotouchyou"forgamish8907@hotmail.comdpeacock261@gmail.com2020-05-0606:11:571jWBPY-0006ic-6K\<=info@whatsup2013.chH=\(localhost\)[123.21.139.93]:47741P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3104id=0a6cda8982a9838b1712a408ef1b312dc6ba74@whatsup2013.chT="Neednewfriend\?"forchobbick449@gmail.comn559@gmial.com2020-05-0606:12:101jWBPl-0006kF-Pr\<=info@whatsup2013.chH=\(localhost\)[113.21.98.67]:55936
2020-05-06 16:27:38

Recently Reported IPs

140.116.28.253 138.48.19.128 193.227.20.189 114.79.46.233
195.246.46.248 163.25.98.169 163.10.76.111 37.128.157.105
140.116.25.122 140.116.89.251 226.215.85.61 140.116.158.42
140.116.136.117 140.116.92.124 167.205.129.187 171.241.54.56
193.6.168.208 134.208.3.65 146.110.195.249 140.116.74.18