Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.70.149.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22987
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.70.149.1.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020601 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 05:32:27 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 1.149.70.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 1.149.70.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
85.209.0.101 attackspam
[H1.VM6] Blocked by UFW
2020-08-09 08:28:54
152.32.106.35 attack
Wordpress attack
2020-08-09 12:03:34
51.75.147.167 attackbotsspam
"URL file extension is restricted by policy - .swp"
2020-08-09 12:02:35
177.87.154.2 attackspam
$f2bV_matches
2020-08-09 12:02:50
62.82.75.58 attackbotsspam
Aug  9 00:07:37 ny01 sshd[20889]: Failed password for root from 62.82.75.58 port 27774 ssh2
Aug  9 00:11:45 ny01 sshd[22021]: Failed password for root from 62.82.75.58 port 28626 ssh2
2020-08-09 12:21:38
218.92.0.171 attackspam
$f2bV_matches
2020-08-09 12:06:51
167.71.210.7 attackspambots
2020-08-08T17:11:25.203882correo.[domain] sshd[18131]: Failed password for root from 167.71.210.7 port 40038 ssh2 2020-08-08T17:12:55.876580correo.[domain] sshd[18536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.210.7 user=root 2020-08-08T17:12:58.195300correo.[domain] sshd[18536]: Failed password for root from 167.71.210.7 port 33430 ssh2 ...
2020-08-09 08:35:29
84.180.236.164 attack
SSH Brute Force
2020-08-09 08:28:01
111.229.53.45 attackspam
SERVER-WEBAPP ThinkPHP 5.0.23/5.1.31 command injection attempt
2020-08-09 08:28:38
165.227.46.89 attackspam
Aug  8 17:18:44 vps46666688 sshd[4552]: Failed password for root from 165.227.46.89 port 46802 ssh2
...
2020-08-09 08:26:59
72.167.226.88 attackspambots
72.167.226.88 - - [09/Aug/2020:04:56:13 +0100] "POST /wp-login.php HTTP/1.1" 200 1996 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
72.167.226.88 - - [09/Aug/2020:04:56:14 +0100] "POST /wp-login.php HTTP/1.1" 200 1929 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
72.167.226.88 - - [09/Aug/2020:04:56:14 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-09 12:02:16
183.233.143.22 attackbotsspam
Attempted Brute Force (dovecot)
2020-08-09 12:12:41
23.101.160.44 attackspam
[2020-08-08 23:54:03] NOTICE[1248][C-00004fdf] chan_sip.c: Call from '' (23.101.160.44:54918) to extension '11009725994397432' rejected because extension not found in context 'public'.
[2020-08-08 23:54:03] SECURITY[1275] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-08T23:54:03.771-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="11009725994397432",SessionID="0x7f27203bfb78",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/23.101.160.44/54918",ACLName="no_extension_match"
[2020-08-08 23:56:01] NOTICE[1248][C-00004fe0] chan_sip.c: Call from '' (23.101.160.44:58702) to extension '8911390498256029' rejected because extension not found in context 'public'.
[2020-08-08 23:56:01] SECURITY[1275] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-08T23:56:01.801-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="8911390498256029",SessionID="0x7f2720621db8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV
...
2020-08-09 12:15:42
223.83.138.104 attackspambots
Brute-force attempt banned
2020-08-09 08:34:04
222.186.15.246 attack
Aug  9 05:53:01 v22019038103785759 sshd\[1276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.246  user=root
Aug  9 05:53:03 v22019038103785759 sshd\[1276\]: Failed password for root from 222.186.15.246 port 39043 ssh2
Aug  9 05:53:06 v22019038103785759 sshd\[1276\]: Failed password for root from 222.186.15.246 port 39043 ssh2
Aug  9 05:53:07 v22019038103785759 sshd\[1276\]: Failed password for root from 222.186.15.246 port 39043 ssh2
Aug  9 05:56:57 v22019038103785759 sshd\[1407\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.246  user=root
...
2020-08-09 12:09:21

Recently Reported IPs

63.196.124.49 239.29.119.0 7.48.9.34 132.8.157.25
67.110.203.119 170.248.53.147 217.200.116.233 143.208.251.197
133.115.248.233 101.249.200.149 76.212.233.56 33.204.212.62
204.198.182.184 55.147.252.204 240.206.109.222 155.204.124.210
131.218.241.10 246.187.197.243 17.10.5.128 233.58.132.236