Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.45.103.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56065
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.45.103.201.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025042001 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 21 06:47:50 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 201.103.45.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 201.103.45.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
206.51.33.6 attackspambots
Invalid user alessia from 206.51.33.6 port 58724
2019-08-23 14:17:40
71.237.171.150 attackspambots
Aug 23 02:01:19 xtremcommunity sshd\[11696\]: Invalid user florin from 71.237.171.150 port 49348
Aug 23 02:01:19 xtremcommunity sshd\[11696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.237.171.150
Aug 23 02:01:21 xtremcommunity sshd\[11696\]: Failed password for invalid user florin from 71.237.171.150 port 49348 ssh2
Aug 23 02:05:34 xtremcommunity sshd\[11936\]: Invalid user lounette from 71.237.171.150 port 38136
Aug 23 02:05:34 xtremcommunity sshd\[11936\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.237.171.150
...
2019-08-23 14:06:11
207.154.225.170 attack
Invalid user shipping from 207.154.225.170 port 58076
2019-08-23 14:16:43
115.159.237.70 attackspambots
Invalid user seth from 115.159.237.70 port 59666
2019-08-23 13:55:54
209.141.58.87 attackspam
Invalid user admin from 209.141.58.87 port 38790
2019-08-23 14:15:28
212.29.224.168 attack
Splunk® : port scan detected:
Aug 23 00:59:30 testbed kernel: Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=82:c6:52:d1:6e:53:64:c3:d6:0b:ef:f0:08:00 SRC=212.29.224.168 DST=104.248.11.191 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=6232 DF PROTO=TCP SPT=50621 DPT=81 WINDOW=14600 RES=0x00 SYN URGP=0
2019-08-23 15:02:14
54.38.214.191 attack
Invalid user hcat from 54.38.214.191 port 42570
2019-08-23 14:51:46
188.20.52.25 attackspam
Invalid user notebook from 188.20.52.25 port 47548
2019-08-23 15:07:19
150.223.2.123 attack
Invalid user g from 150.223.2.123 port 38314
2019-08-23 14:27:24
118.68.170.172 attack
Aug 23 07:43:00 legacy sshd[24177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.68.170.172
Aug 23 07:43:02 legacy sshd[24177]: Failed password for invalid user custserv from 118.68.170.172 port 48284 ssh2
Aug 23 07:47:44 legacy sshd[24328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.68.170.172
...
2019-08-23 13:53:28
41.234.99.7 attack
Invalid user admin from 41.234.99.7 port 56474
2019-08-23 14:09:34
104.248.187.179 attackbotsspam
Aug 22 20:28:56 web9 sshd\[32017\]: Invalid user siphiwo from 104.248.187.179
Aug 22 20:28:56 web9 sshd\[32017\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.187.179
Aug 22 20:28:58 web9 sshd\[32017\]: Failed password for invalid user siphiwo from 104.248.187.179 port 54142 ssh2
Aug 22 20:32:55 web9 sshd\[390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.187.179  user=root
Aug 22 20:32:57 web9 sshd\[390\]: Failed password for root from 104.248.187.179 port 38558 ssh2
2019-08-23 14:44:21
113.54.159.55 attack
Invalid user tester from 113.54.159.55 port 36088
2019-08-23 13:57:59
1.203.115.140 attackspambots
Invalid user svn from 1.203.115.140 port 38344
2019-08-23 14:59:50
13.94.41.150 attack
Automatic report - SSH Brute-Force Attack
2019-08-23 14:58:08

Recently Reported IPs

106.10.244.39 223.113.128.187 162.216.150.128 108.53.44.143
122.225.77.80 59.82.21.227 172.202.117.125 111.208.45.100
61.82.138.79 224.3.75.82 3.83.212.95 113.141.93.105
125.122.14.4 20.163.14.131 148.66.16.50 24.199.82.60
124.105.27.59 120.238.142.199 59.37.169.172 179.43.168.146