Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.90.216.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40520
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.90.216.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013000 1800 900 604800 86400

;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 19:15:18 CST 2025
;; MSG SIZE  rcvd: 107
Host info
b'Host 142.216.90.138.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 138.90.216.142.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
123.206.190.82 attackspambots
Invalid user griffin from 123.206.190.82 port 35558
2020-08-18 18:22:38
103.136.40.26 attackbots
Multiple SSH authentication failures from 103.136.40.26
2020-08-18 17:58:06
47.244.207.236 attack
Automatic report - Banned IP Access
2020-08-18 18:04:04
71.186.165.41 attack
SSH invalid-user multiple login attempts
2020-08-18 18:28:17
2605:6400:3:fed5:1000:4:0:5 attackspam
C1,WP GET /nelson/home/wp-includes/wlwmanifest.xml
2020-08-18 18:04:31
213.217.1.23 attackspambots
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-08-18 18:01:22
152.231.140.150 attackbots
Aug 18 06:29:13 ws22vmsma01 sshd[205043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.231.140.150
Aug 18 06:29:15 ws22vmsma01 sshd[205043]: Failed password for invalid user syed from 152.231.140.150 port 57011 ssh2
...
2020-08-18 17:45:53
189.237.240.43 attackspam
Automated report (2020-08-18T11:50:20+08:00). Referrer spam originating from this address detected (anti-crisis-seo.com).
2020-08-18 18:03:13
180.76.161.203 attackbots
Invalid user java from 180.76.161.203 port 45142
2020-08-18 18:09:30
87.246.7.27 attack
Aug 18 06:38:47 localhost postfix/smtpd\[15768\]: warning: unknown\[87.246.7.27\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 18 06:39:03 localhost postfix/smtpd\[15768\]: warning: unknown\[87.246.7.27\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 18 06:39:24 localhost postfix/smtpd\[15768\]: warning: unknown\[87.246.7.27\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 18 06:39:58 localhost postfix/smtpd\[15768\]: warning: unknown\[87.246.7.27\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 18 06:40:16 localhost postfix/smtpd\[15845\]: warning: unknown\[87.246.7.27\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-18 17:56:38
155.94.146.82 attackbots
Invalid user edu from 155.94.146.82 port 37894
2020-08-18 18:30:04
43.245.185.66 attack
Invalid user replicator from 43.245.185.66 port 48930
2020-08-18 17:57:12
92.63.197.55 attackbots
TCP port : 3555
2020-08-18 18:15:36
66.249.64.73 attackspambots
404 NOT FOUND
2020-08-18 18:12:30
49.88.112.60 attack
Aug 18 09:23:14 game-panel sshd[19736]: Failed password for root from 49.88.112.60 port 18249 ssh2
Aug 18 09:23:16 game-panel sshd[19736]: Failed password for root from 49.88.112.60 port 18249 ssh2
Aug 18 09:23:18 game-panel sshd[19736]: Failed password for root from 49.88.112.60 port 18249 ssh2
2020-08-18 18:20:16

Recently Reported IPs

95.238.85.149 32.227.242.234 163.46.63.181 189.157.103.83
21.186.1.42 160.37.210.214 47.98.139.32 209.128.92.53
21.189.72.226 70.43.153.69 50.49.241.82 163.171.43.195
233.7.196.26 160.192.244.38 47.2.147.200 192.131.95.90
141.181.16.237 90.225.154.126 155.207.63.70 138.144.44.74