Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.3.7.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8578
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.3.7.70.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121502 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 16 13:21:58 CST 2025
;; MSG SIZE  rcvd: 103
Host info
Host 70.7.3.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 70.7.3.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
47.244.244.136 attackspambots
michaelklotzbier.de 47.244.244.136 [05/Jun/2020:05:56:35 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4280 "https://michaelklotzbier.de/xmlrpc.php" "python-requests/2.22.0"
michaelklotzbier.de 47.244.244.136 [05/Jun/2020:05:56:36 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4280 "https://michaelklotzbier.de/xmlrpc.php" "python-requests/2.22.0"
2020-06-05 13:51:54
192.241.211.215 attack
Jun  5 05:42:29 nas sshd[10710]: Failed password for root from 192.241.211.215 port 50597 ssh2
Jun  5 05:50:38 nas sshd[11036]: Failed password for root from 192.241.211.215 port 36266 ssh2
Jun  5 05:57:00 nas sshd[11108]: Failed password for root from 192.241.211.215 port 37955 ssh2
...
2020-06-05 13:28:23
159.65.136.196 attackbots
Jun  5 07:04:07 sip sshd[546947]: Failed password for root from 159.65.136.196 port 32932 ssh2
Jun  5 07:08:01 sip sshd[546974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.136.196  user=root
Jun  5 07:08:03 sip sshd[546974]: Failed password for root from 159.65.136.196 port 36642 ssh2
...
2020-06-05 13:20:23
45.236.73.213 attackbots
(BR/Brazil/-) SMTP Bruteforcing attempts
2020-06-05 13:10:40
45.143.223.195 attackspambots
Jun  5 06:57:06 debian kernel: [231988.968613] [UFW BLOCK] IN=eth0 OUT= MAC=52:54:00:be:e4:65:08:e8:4f:6e:48:0c:08:00 SRC=45.143.223.195 DST=89.252.131.35 LEN=52 TOS=0x02 PREC=0x00 TTL=116 ID=3671 DF PROTO=TCP SPT=59034 DPT=25 WINDOW=8192 RES=0x00 CWR ECE SYN URGP=0
2020-06-05 13:26:17
87.246.7.66 attackbotsspam
Jun  5 07:27:38 srv01 postfix/smtpd\[29463\]: warning: unknown\[87.246.7.66\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  5 07:27:50 srv01 postfix/smtpd\[2411\]: warning: unknown\[87.246.7.66\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  5 07:27:50 srv01 postfix/smtpd\[2953\]: warning: unknown\[87.246.7.66\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  5 07:27:51 srv01 postfix/smtpd\[29463\]: warning: unknown\[87.246.7.66\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  5 07:28:26 srv01 postfix/smtpd\[2411\]: warning: unknown\[87.246.7.66\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-05 13:40:22
114.67.110.227 attackbotsspam
Jun  5 06:51:58 server sshd[7347]: Failed password for root from 114.67.110.227 port 40127 ssh2
Jun  5 06:54:04 server sshd[7503]: Failed password for root from 114.67.110.227 port 53082 ssh2
...
2020-06-05 13:12:11
45.230.77.215 attackbots
(BR/Brazil/-) SMTP Bruteforcing attempts
2020-06-05 13:21:07
177.92.66.226 attack
$f2bV_matches
2020-06-05 13:18:43
122.51.217.125 attackbots
Jun  5 09:56:39 gw1 sshd[4071]: Failed password for root from 122.51.217.125 port 59748 ssh2
...
2020-06-05 13:47:13
195.70.59.121 attackspambots
$f2bV_matches
2020-06-05 13:31:02
112.85.42.229 attackbotsspam
Jun  5 07:26:52 home sshd[2143]: Failed password for root from 112.85.42.229 port 17767 ssh2
Jun  5 07:26:54 home sshd[2143]: Failed password for root from 112.85.42.229 port 17767 ssh2
Jun  5 07:26:57 home sshd[2143]: Failed password for root from 112.85.42.229 port 17767 ssh2
...
2020-06-05 13:27:38
87.101.92.28 attackspambots
Unauthorized connection attempt detected from IP address 87.101.92.28 to port 8000
2020-06-05 13:45:39
24.130.9.68 attack
Bruteforce detected by fail2ban
2020-06-05 13:11:30
45.227.98.144 attackbotsspam
(BR/Brazil/-) SMTP Bruteforcing attempts
2020-06-05 13:49:53

Recently Reported IPs

113.9.255.221 29.122.153.128 159.123.114.236 188.82.19.238
154.7.214.220 179.157.78.71 120.36.157.118 187.109.34.142
52.52.216.73 45.115.38.55 167.126.73.242 216.38.174.182
33.153.9.232 59.255.15.40 42.15.164.148 140.204.44.129
50.181.89.109 250.55.137.30 156.160.67.228 121.25.152.149