Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.25.65.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58338
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.25.65.44.			IN	A

;; AUTHORITY SECTION:
.			541	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 12:30:04 CST 2022
;; MSG SIZE  rcvd: 105
Host info
44.65.25.138.in-addr.arpa domain name pointer saflii1.austlii.edu.au.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
44.65.25.138.in-addr.arpa	name = saflii1.austlii.edu.au.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.148.10.62 attackspambots
SMTP
2019-12-01 06:07:33
185.176.27.14 attackspambots
firewall-block, port(s): 6789/tcp, 6790/tcp
2019-12-01 06:05:18
23.94.46.192 attackbots
Sep  4 03:19:32 meumeu sshd[7911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.94.46.192 
Sep  4 03:19:35 meumeu sshd[7911]: Failed password for invalid user vncuser from 23.94.46.192 port 34694 ssh2
Sep  4 03:23:48 meumeu sshd[8487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.94.46.192 
...
2019-12-01 05:52:00
160.20.12.127 attackbotsspam
160.20.12.127 has been banned for [spam]
...
2019-12-01 05:48:29
169.57.66.150 attackspambots
3389BruteforceFW21
2019-12-01 06:20:23
86.15.148.166 attack
3389BruteforceFW23
2019-12-01 05:55:51
62.173.154.20 attack
Fail2Ban Ban Triggered
2019-12-01 06:12:36
104.223.158.17 attackspambots
Nov 30 15:28:32 smtp postfix/smtpd[37984]: NOQUEUE: reject: RCPT from amazon-us-west-amazonaws17.shqmcg.com[104.223.158.17]: 554 5.7.1 Service unavailable; Client host [104.223.158.17] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?104.223.158.17; from= to= proto=ESMTP helo=
...
2019-12-01 05:51:09
116.106.35.164 attack
Automatic report - Port Scan Attack
2019-12-01 06:16:55
111.231.119.188 attackspam
Nov 30 22:52:24 lnxded64 sshd[27725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.119.188
2019-12-01 05:58:42
201.163.180.183 attackbotsspam
Apr 16 22:37:02 meumeu sshd[24769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.163.180.183 
Apr 16 22:37:04 meumeu sshd[24769]: Failed password for invalid user Anne from 201.163.180.183 port 40709 ssh2
Apr 16 22:39:37 meumeu sshd[25073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.163.180.183 
...
2019-12-01 05:53:24
107.189.11.11 attack
Invalid user fake from 107.189.11.11 port 41452
2019-12-01 06:03:39
106.12.222.40 attackbots
SSH bruteforce (Triggered fail2ban)
2019-12-01 05:57:21
180.163.220.60 attackbots
Automatic report - Banned IP Access
2019-12-01 05:43:53
103.87.207.230 attackspam
Nov 30 15:28:17 MK-Soft-VM8 sshd[20777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.87.207.230 
Nov 30 15:28:18 MK-Soft-VM8 sshd[20777]: Failed password for invalid user ubnt from 103.87.207.230 port 49693 ssh2
...
2019-12-01 05:57:46

Recently Reported IPs

138.251.22.76 138.255.12.128 138.255.12.125 138.255.12.152
138.255.103.170 138.255.12.126 138.255.12.99 138.255.144.116
138.255.12.123 138.255.12.153 138.255.150.30 138.255.150.129
138.255.150.14 138.255.150.82 138.255.186.15 138.255.185.12
138.255.207.98 138.255.217.168 138.255.193.56 138.255.207.168