Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.138.8.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13679
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.138.8.16.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019073101 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Aug 01 08:48:01 CST 2019
;; MSG SIZE  rcvd: 115
Host info
Host 16.8.138.14.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 16.8.138.14.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
223.240.216.33 attackspam
/download/file.php?id=149&sid=c171239170bbde6e2ef9593e7cb35c68
2019-10-15 14:50:20
103.92.84.102 attackspambots
Oct 15 06:44:55 hcbbdb sshd\[32710\]: Invalid user marlin from 103.92.84.102
Oct 15 06:44:55 hcbbdb sshd\[32710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.92.84.102
Oct 15 06:44:57 hcbbdb sshd\[32710\]: Failed password for invalid user marlin from 103.92.84.102 port 42660 ssh2
Oct 15 06:50:14 hcbbdb sshd\[932\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.92.84.102  user=root
Oct 15 06:50:16 hcbbdb sshd\[932\]: Failed password for root from 103.92.84.102 port 52856 ssh2
2019-10-15 14:53:34
93.42.110.44 attackspambots
" "
2019-10-15 14:44:10
2.59.21.207 attack
[Aegis] @ 2019-10-15 04:50:08  0100 -> A web attack returned code 200 (success).
2019-10-15 15:07:21
187.148.4.135 attackspambots
Automatic report - Port Scan Attack
2019-10-15 15:15:32
178.128.72.117 attackbots
WordPress login Brute force / Web App Attack on client site.
2019-10-15 15:05:04
80.103.163.66 attackbotsspam
Oct 15 08:33:29 rotator sshd\[25481\]: Invalid user tex from 80.103.163.66Oct 15 08:33:32 rotator sshd\[25481\]: Failed password for invalid user tex from 80.103.163.66 port 34242 ssh2Oct 15 08:37:29 rotator sshd\[26257\]: Invalid user nordica from 80.103.163.66Oct 15 08:37:31 rotator sshd\[26257\]: Failed password for invalid user nordica from 80.103.163.66 port 54354 ssh2Oct 15 08:41:47 rotator sshd\[27073\]: Invalid user kuaisuweb from 80.103.163.66Oct 15 08:41:49 rotator sshd\[27073\]: Failed password for invalid user kuaisuweb from 80.103.163.66 port 46237 ssh2
...
2019-10-15 15:09:57
104.244.73.126 attackspam
xmlrpc attack
2019-10-15 14:42:48
190.14.240.74 attackspambots
Oct 15 08:42:09 vtv3 sshd\[20506\]: Invalid user ftpuser from 190.14.240.74 port 38856
Oct 15 08:42:09 vtv3 sshd\[20506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.14.240.74
Oct 15 08:42:11 vtv3 sshd\[20506\]: Failed password for invalid user ftpuser from 190.14.240.74 port 38856 ssh2
Oct 15 08:46:12 vtv3 sshd\[22497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.14.240.74  user=root
Oct 15 08:46:14 vtv3 sshd\[22497\]: Failed password for root from 190.14.240.74 port 50390 ssh2
Oct 15 08:58:36 vtv3 sshd\[28352\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.14.240.74  user=root
Oct 15 08:58:38 vtv3 sshd\[28352\]: Failed password for root from 190.14.240.74 port 56802 ssh2
Oct 15 09:03:06 vtv3 sshd\[30608\]: Invalid user redmine from 190.14.240.74 port 40112
Oct 15 09:03:06 vtv3 sshd\[30608\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 eu
2019-10-15 15:20:33
52.37.77.98 attack
10/15/2019-08:56:13.262699 52.37.77.98 Protocol: 6 SURICATA TLS invalid record/traffic
2019-10-15 15:08:00
103.55.215.134 attackspam
Unauthorized IMAP connection attempt
2019-10-15 15:00:33
159.203.193.51 attack
firewall-block, port(s): 9080/tcp
2019-10-15 15:05:54
5.188.86.22 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 9 - port: 3392 proto: TCP cat: Misc Attack
2019-10-15 15:17:47
109.167.134.253 attack
Sending SPAM email
2019-10-15 15:12:26
96.30.84.204 attack
firewall-block, port(s): 88/tcp
2019-10-15 15:08:54

Recently Reported IPs

189.65.142.130 142.210.172.245 152.134.232.80 50.230.210.68
125.201.54.141 61.157.138.188 121.234.201.141 6.212.159.219
158.184.75.146 85.6.6.215 81.253.211.161 78.139.18.16
98.12.151.250 122.2.229.165 220.194.70.52 189.28.180.216
27.16.218.47 140.207.51.190 223.206.68.51 222.163.233.87