Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.99.153.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62537
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.99.153.169.			IN	A

;; AUTHORITY SECTION:
.			383	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 23:11:04 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 169.153.99.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 169.153.99.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.36.81.173 attackbots
Rude login attack (21 tries in 1d)
2019-07-03 07:42:31
58.250.79.7 attack
Automatic report - Web App Attack
2019-07-03 07:19:15
165.22.96.227 attackspam
Jul  3 01:29:37 lnxded63 sshd[25873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.96.227
Jul  3 01:29:37 lnxded63 sshd[25873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.96.227
2019-07-03 07:34:04
92.222.66.27 attack
Jul  3 01:17:17 OPSO sshd\[10386\]: Invalid user microsoft from 92.222.66.27 port 34880
Jul  3 01:17:17 OPSO sshd\[10386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.66.27
Jul  3 01:17:19 OPSO sshd\[10386\]: Failed password for invalid user microsoft from 92.222.66.27 port 34880 ssh2
Jul  3 01:21:17 OPSO sshd\[10766\]: Invalid user ping from 92.222.66.27 port 37434
Jul  3 01:21:17 OPSO sshd\[10766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.66.27
2019-07-03 07:31:23
185.36.81.169 attackbots
Rude login attack (19 tries in 1d)
2019-07-03 07:33:15
103.44.132.44 attackbots
Jul  2 23:55:47 localhost sshd\[8404\]: Invalid user weng123 from 103.44.132.44 port 58594
Jul  2 23:55:47 localhost sshd\[8404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.44.132.44
Jul  2 23:55:49 localhost sshd\[8404\]: Failed password for invalid user weng123 from 103.44.132.44 port 58594 ssh2
Jul  2 23:57:42 localhost sshd\[8473\]: Invalid user 123 from 103.44.132.44 port 48808
Jul  2 23:57:42 localhost sshd\[8473\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.44.132.44
...
2019-07-03 08:01:49
37.49.225.137 attackbotsspam
Rude login attack (5 tries in 1d)
2019-07-03 07:30:43
92.119.160.125 attack
02.07.2019 23:50:14 Connection to port 3107 blocked by firewall
2019-07-03 08:02:05
118.24.92.216 attackbots
Unauthorized SSH login attempts
2019-07-03 07:39:10
185.36.81.175 attackspambots
Rude login attack (20 tries in 1d)
2019-07-03 07:46:32
185.36.81.166 attackspam
Rude login attack (22 tries in 1d)
2019-07-03 07:35:53
108.178.16.154 attack
Port scan attempt detected by AWS-CCS, CTS, India
2019-07-03 07:55:28
103.38.194.139 attackbots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.38.194.139
Failed password for invalid user lan from 103.38.194.139 port 59982 ssh2
Invalid user kerapetse from 103.38.194.139 port 54708
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.38.194.139
Failed password for invalid user kerapetse from 103.38.194.139 port 54708 ssh2
2019-07-03 07:27:23
165.227.97.108 attackbotsspam
'Fail2Ban'
2019-07-03 07:37:32
178.62.226.37 attackspam
SSH bruteforce
2019-07-03 07:43:34

Recently Reported IPs

209.239.224.152 42.231.90.235 120.86.239.149 201.234.78.238
37.49.225.150 183.220.1.32 94.78.99.68 178.72.78.51
106.92.127.35 151.8.211.130 104.21.43.113 125.34.231.3
200.208.48.42 115.97.142.157 189.213.148.151 1.15.31.27
213.166.79.192 114.237.99.105 182.127.136.139 23.105.86.124