Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: Verizon

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.5.135.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19476
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.5.135.149.			IN	A

;; AUTHORITY SECTION:
.			213	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032300 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 23 18:45:01 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 149.135.5.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.135.5.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
132.145.213.82 attackbotsspam
$f2bV_matches
2019-11-19 00:41:49
157.245.243.4 attack
Nov 18 17:02:24 sd-53420 sshd\[30202\]: Invalid user Edvard from 157.245.243.4
Nov 18 17:02:24 sd-53420 sshd\[30202\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.243.4
Nov 18 17:02:27 sd-53420 sshd\[30202\]: Failed password for invalid user Edvard from 157.245.243.4 port 41840 ssh2
Nov 18 17:06:11 sd-53420 sshd\[31298\]: User lp from 157.245.243.4 not allowed because none of user's groups are listed in AllowGroups
Nov 18 17:06:11 sd-53420 sshd\[31298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.243.4  user=lp
...
2019-11-19 00:18:19
187.178.173.161 attackbots
Nov 18 15:51:48 MK-Soft-VM3 sshd[31781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.178.173.161 
Nov 18 15:51:50 MK-Soft-VM3 sshd[31781]: Failed password for invalid user dfaris from 187.178.173.161 port 40461 ssh2
...
2019-11-19 00:13:06
139.199.39.5 attack
web Attack on Website
2019-11-19 00:41:28
110.235.251.1 attackbots
web Attack on Website
2019-11-19 00:14:44
181.114.52.8 attackbots
web Attack on Website
2019-11-19 00:55:31
50.73.116.4 attackspam
web Attack on Website
2019-11-19 00:39:47
101.234.76.51 attackbotsspam
port scan and connect, tcp 1433 (ms-sql-s)
2019-11-19 00:16:08
92.25.170.2 attackspam
web Attack on Website
2019-11-19 00:45:57
112.112.86.2 attackbots
web Attack on Website
2019-11-19 00:57:04
210.36.98.1 attackbotsspam
web Attack on Website
2019-11-19 00:45:09
49.235.226.43 attackspambots
$f2bV_matches
2019-11-19 00:52:17
106.13.89.1 attackspambots
web Attack on Website
2019-11-19 00:23:31
139.255.101.2 attackspambots
web Attack on Website
2019-11-19 00:15:40
5.189.176.2 attack
web Attack on Website
2019-11-19 00:19:23

Recently Reported IPs

194.225.47.83 178.96.148.114 202.44.139.50 255.184.38.28
60.213.159.12 103.61.139.4 234.59.226.100 109.108.156.67
54.195.154.241 36.54.101.215 215.248.241.2 146.209.138.189
21.179.188.101 74.116.66.233 158.102.1.103 221.245.33.246
52.93.28.222 71.218.151.56 73.39.124.207 169.165.89.220