Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Belgium

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.48.140.163
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51095
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.48.140.163.			IN	A

;; AUTHORITY SECTION:
.			326	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023062300 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 23 14:38:22 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 163.140.48.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 163.140.48.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
189.91.6.19 attackspam
Brute force attack stopped by firewall
2019-07-08 15:20:20
191.53.195.208 attack
Brute force attack stopped by firewall
2019-07-08 15:02:05
191.53.197.45 attack
smtp auth brute force
2019-07-08 15:10:59
138.186.114.111 attackspambots
failed_logins
2019-07-08 14:58:54
191.53.249.139 attackbotsspam
Jul  7 22:11:16 web1 postfix/smtpd[17365]: warning: unknown[191.53.249.139]: SASL PLAIN authentication failed: authentication failure
...
2019-07-08 15:40:13
177.154.234.169 attackbots
Brute force attack stopped by firewall
2019-07-08 15:39:47
191.53.222.21 attack
Brute force attack stopped by firewall
2019-07-08 15:40:59
191.53.250.250 attackspambots
Brute force attack stopped by firewall
2019-07-08 15:41:54
61.220.36.25 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-07 22:01:53,716 INFO [amun_request_handler] PortScan Detected on Port: 445 (61.220.36.25)
2019-07-08 15:18:14
179.189.202.169 attack
Brute force attack stopped by firewall
2019-07-08 15:26:43
86.57.232.53 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-07 22:08:11,799 INFO [shellcode_manager] (86.57.232.53) no match, writing hexdump (f2833217346e34f09d10f3545d22ac5b :2325764) - MS17010 (EternalBlue)
2019-07-08 15:50:24
191.53.250.48 attackspam
Brute force attack to crack SMTP password (port 25 / 587)
2019-07-08 15:19:20
201.210.154.168 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-07 22:01:20,090 INFO [shellcode_manager] (201.210.154.168) no match, writing hexdump (c08a6e110a3290cef632c05c0b5fee13 :15033) - SMB (Unknown)
2019-07-08 15:28:44
200.199.142.163 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-07 20:13:38,359 INFO [shellcode_manager] (200.199.142.163) no match, writing hexdump (3751ef5fe201cc4c3003204ebd462141 :2437546) - MS17010 (EternalBlue)
2019-07-08 15:12:34
191.53.199.206 attackbots
Brute force attack stopped by firewall
2019-07-08 15:07:53

Recently Reported IPs

102.76.201.70 192.240.163.106 213.97.191.16 170.141.230.105
183.65.253.85 193.41.144.88 59.18.105.165 180.101.244.13
177.121.87.232 106.13.167.17 13.113.19.105 185.250.237.97
46.232.121.145 111.90.159.56 249.41.73.169 31.143.16.97
178.128.36.156 1.13.6.151 158.53.244.231 158.53.244.253