Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tokyo

Region: Tokyo

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.64.69.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52427
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.64.69.11.			IN	A

;; AUTHORITY SECTION:
.			310	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020070200 1800 900 604800 86400

;; Query time: 94 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jul 02 16:54:33 CST 2020
;; MSG SIZE  rcvd: 116
Host info
11.69.64.138.in-addr.arpa domain name pointer ai069011.d.east.v6connect.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
11.69.64.138.in-addr.arpa	name = ai069011.d.east.v6connect.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
113.190.226.220 attackbots
Unauthorized connection attempt from IP address 113.190.226.220 on Port 445(SMB)
2019-12-20 05:54:59
42.113.165.132 attackbotsspam
Unauthorized connection attempt detected from IP address 42.113.165.132 to port 445
2019-12-20 05:31:21
143.208.180.212 attackbotsspam
Dec 19 21:57:27 h2177944 sshd\[20908\]: Invalid user rashidahmad from 143.208.180.212 port 56536
Dec 19 21:57:27 h2177944 sshd\[20908\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.208.180.212
Dec 19 21:57:29 h2177944 sshd\[20908\]: Failed password for invalid user rashidahmad from 143.208.180.212 port 56536 ssh2
Dec 19 22:04:36 h2177944 sshd\[21591\]: Invalid user bassem from 143.208.180.212 port 55184
...
2019-12-20 05:27:59
85.132.100.24 attackbots
Dec 20 00:19:46 server sshd\[15419\]: Invalid user izawa from 85.132.100.24
Dec 20 00:19:46 server sshd\[15419\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.132.100.24 
Dec 20 00:19:47 server sshd\[15419\]: Failed password for invalid user izawa from 85.132.100.24 port 34690 ssh2
Dec 20 00:26:19 server sshd\[17523\]: Invalid user home from 85.132.100.24
Dec 20 00:26:19 server sshd\[17523\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.132.100.24 
...
2019-12-20 05:40:48
81.170.214.154 attack
2019-12-19 19:50:30,829 fail2ban.actions        \[10658\]: NOTICE  \[sshd\] Ban 81.170.214.154
2019-12-19 20:23:52,723 fail2ban.actions        \[10658\]: NOTICE  \[sshd\] Ban 81.170.214.154
2019-12-19 21:03:17,914 fail2ban.actions        \[10658\]: NOTICE  \[sshd\] Ban 81.170.214.154
2019-12-19 21:42:41,923 fail2ban.actions        \[10658\]: NOTICE  \[sshd\] Ban 81.170.214.154
2019-12-19 22:17:16,042 fail2ban.actions        \[10658\]: NOTICE  \[sshd\] Ban 81.170.214.154
...
2019-12-20 05:34:37
112.85.42.194 attackspam
Dec 19 22:29:58 srv206 sshd[23005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.194  user=root
Dec 19 22:30:01 srv206 sshd[23005]: Failed password for root from 112.85.42.194 port 58533 ssh2
...
2019-12-20 05:58:55
123.176.98.150 attackbotsspam
Unauthorized connection attempt detected from IP address 123.176.98.150 to port 1433
2019-12-20 05:48:47
177.38.37.241 attackspambots
1576775928 - 12/19/2019 18:18:48 Host: 177.38.37.241/177.38.37.241 Port: 445 TCP Blocked
2019-12-20 05:38:45
149.202.206.206 attack
$f2bV_matches_ltvn
2019-12-20 05:47:48
185.127.24.213 attackbotsspam
SSH invalid-user multiple login try
2019-12-20 06:04:29
187.141.71.27 attackbots
SSH bruteforce
2019-12-20 05:30:40
91.121.87.174 attack
Invalid user backup from 91.121.87.174 port 55366
2019-12-20 06:02:15
102.132.252.86 attackspam
firewall-block, port(s): 22/tcp
2019-12-20 05:56:02
149.56.45.87 attackspam
Dec 19 21:19:02 cp sshd[17413]: Failed password for root from 149.56.45.87 port 55708 ssh2
Dec 19 21:19:02 cp sshd[17413]: Failed password for root from 149.56.45.87 port 55708 ssh2
2019-12-20 06:01:15
86.56.11.228 attack
Dec 19 22:22:40 markkoudstaal sshd[22116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.56.11.228
Dec 19 22:22:42 markkoudstaal sshd[22116]: Failed password for invalid user okey from 86.56.11.228 port 40566 ssh2
Dec 19 22:27:54 markkoudstaal sshd[22744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.56.11.228
2019-12-20 05:29:50

Recently Reported IPs

198.55.213.152 157.23.113.9 189.205.156.20 141.97.164.210
66.191.150.153 91.226.8.5 78.66.109.84 115.181.49.85
213.165.98.227 134.113.97.105 63.231.36.38 111.80.171.182
126.90.105.213 58.115.52.215 76.188.97.128 53.200.237.128
158.88.19.184 146.167.217.190 54.194.205.36 76.132.168.54