Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.53.105.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41595
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.53.105.11.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030601 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 07 11:33:58 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 11.105.53.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 11.105.53.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
54.37.67.144 attackspam
Mar 23 13:44:08 meumeu sshd[3886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.67.144 
Mar 23 13:44:10 meumeu sshd[3886]: Failed password for invalid user hexiujing from 54.37.67.144 port 42132 ssh2
Mar 23 13:48:14 meumeu sshd[4395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.67.144 
...
2020-03-23 21:31:18
107.173.160.139 attackbotsspam
EXPLOIT Remote Command Execution via Shell Script -2
2020-03-23 22:06:40
149.202.56.194 attackbotsspam
Invalid user lu from 149.202.56.194 port 47082
2020-03-23 21:46:16
185.9.230.228 attackbotsspam
Invalid user ftpuser from 185.9.230.228 port 33050
2020-03-23 21:42:14
60.240.45.115 attackspambots
Mar 23 06:33:36 sshgateway sshd\[30520\]: Invalid user gx from 60.240.45.115
Mar 23 06:33:36 sshgateway sshd\[30520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60-240-45-115.static.tpgi.com.au
Mar 23 06:33:39 sshgateway sshd\[30520\]: Failed password for invalid user gx from 60.240.45.115 port 54684 ssh2
2020-03-23 22:20:19
154.8.159.155 attack
2020-03-23T01:29:56.267092suse-nuc sshd[19042]: Invalid user sl from 154.8.159.155 port 47914
...
2020-03-23 22:18:13
184.105.247.254 attack
Mar 23 07:33:48 debian-2gb-nbg1-2 kernel: \[7204318.399955\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=184.105.247.254 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=54321 PROTO=TCP SPT=36547 DPT=6379 WINDOW=65535 RES=0x00 SYN URGP=0
2020-03-23 21:56:22
77.201.219.171 attackbotsspam
2020-03-23T13:49:01.339224abusebot-8.cloudsearch.cf sshd[26515]: Invalid user stone from 77.201.219.171 port 55032
2020-03-23T13:49:01.350124abusebot-8.cloudsearch.cf sshd[26515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.219.201.77.rev.sfr.net
2020-03-23T13:49:01.339224abusebot-8.cloudsearch.cf sshd[26515]: Invalid user stone from 77.201.219.171 port 55032
2020-03-23T13:49:03.884337abusebot-8.cloudsearch.cf sshd[26515]: Failed password for invalid user stone from 77.201.219.171 port 55032 ssh2
2020-03-23T13:54:08.546893abusebot-8.cloudsearch.cf sshd[26862]: Invalid user geography from 77.201.219.171 port 42390
2020-03-23T13:54:08.564154abusebot-8.cloudsearch.cf sshd[26862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.219.201.77.rev.sfr.net
2020-03-23T13:54:08.546893abusebot-8.cloudsearch.cf sshd[26862]: Invalid user geography from 77.201.219.171 port 42390
2020-03-23T13:54:09.905960abuseb
...
2020-03-23 21:54:58
31.145.150.194 attack
Unauthorized connection attempt detected from IP address 31.145.150.194 to port 445
2020-03-23 21:55:12
138.197.89.212 attackbots
Mar 23 10:07:33 ip-172-31-62-245 sshd\[22949\]: Invalid user adrianne from 138.197.89.212\
Mar 23 10:07:36 ip-172-31-62-245 sshd\[22949\]: Failed password for invalid user adrianne from 138.197.89.212 port 51322 ssh2\
Mar 23 10:11:10 ip-172-31-62-245 sshd\[23051\]: Invalid user ii from 138.197.89.212\
Mar 23 10:11:12 ip-172-31-62-245 sshd\[23051\]: Failed password for invalid user ii from 138.197.89.212 port 39072 ssh2\
Mar 23 10:14:45 ip-172-31-62-245 sshd\[23065\]: Invalid user konrad from 138.197.89.212\
2020-03-23 21:50:04
118.70.67.233 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-23 21:30:25
180.249.100.218 attackspambots
Unauthorized connection attempt from IP address 180.249.100.218 on Port 445(SMB)
2020-03-23 21:37:15
201.209.147.248 attackbotsspam
Honeypot attack, port: 445, PTR: 201-209-147-248.genericrev.cantv.net.
2020-03-23 21:36:21
92.118.37.61 attack
scans 12 times in preceeding hours on the ports (in chronological order) 9685 54996 14503 9938 1034 8228 1389 28357 9528 2012 20181 24769 resulting in total of 29 scans from 92.118.37.0/24 block.
2020-03-23 22:19:26
185.153.197.104 attackbots
Unauthorized connection attempt detected from IP address 185.153.197.104 to port 80 [T]
2020-03-23 21:44:24

Recently Reported IPs

133.180.231.97 98.72.129.34 142.244.231.54 148.14.9.120
23.234.17.182 55.216.69.220 99.219.104.203 175.24.134.112
109.4.237.245 55.41.59.15 99.149.88.131 241.103.199.148
144.135.48.210 228.87.255.17 175.229.64.41 177.114.29.104
180.116.140.26 14.177.4.58 208.9.209.42 53.156.187.254