Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 144.1.138.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55950
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;144.1.138.112.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012501 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 02:51:18 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 112.138.1.144.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 112.138.1.144.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
113.247.100.190 attackbots
" "
2020-02-15 07:13:55
104.248.135.31 attackbotsspam
WordPress login Brute force / Web App Attack on client site.
2020-02-15 07:17:22
185.143.223.163 attack
Feb 14 23:25:51 webserver postfix/smtpd\[2480\]: NOQUEUE: reject: RCPT from unknown\[185.143.223.163\]: 454 4.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[185.143.223.97\]\>
Feb 14 23:25:51 webserver postfix/smtpd\[2480\]: NOQUEUE: reject: RCPT from unknown\[185.143.223.163\]: 454 4.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[185.143.223.97\]\>
Feb 14 23:25:51 webserver postfix/smtpd\[2480\]: NOQUEUE: reject: RCPT from unknown\[185.143.223.163\]: 454 4.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[185.143.223.97\]\>
Feb 14 23:25:51 webserver postfix/smtpd\[2480\]: NOQUEUE: reject: RCPT from unknown\[185.143.223.163\]: 454 4.7.1 \: Relay access denied\; from=\
2020-02-15 07:05:00
89.248.160.150 attackbots
Multiport scan : 14 ports scanned 28012 28015 28068 30301 34567 36693 37959 40619 40666 40685 40698 40710 40724 40734
2020-02-15 07:29:32
51.83.78.109 attack
Invalid user user from 51.83.78.109 port 56462
2020-02-15 07:13:31
45.125.66.165 attackbots
Rude login attack (6 tries in 1d)
2020-02-15 07:16:14
191.5.114.162 attackbots
Honeypot attack, port: 445, PTR: 191-5-114-162customer.viaprovedor.com.br.
2020-02-15 07:29:09
103.228.58.187 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-15 07:20:03
122.51.186.145 attack
Feb 14 23:38:25 silence02 sshd[6821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.186.145
Feb 14 23:38:27 silence02 sshd[6821]: Failed password for invalid user tuscany from 122.51.186.145 port 60368 ssh2
Feb 14 23:41:38 silence02 sshd[7055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.186.145
2020-02-15 07:00:07
196.188.42.130 attackbotsspam
Feb 14 17:45:58 plusreed sshd[10638]: Invalid user buildbot from 196.188.42.130
...
2020-02-15 07:05:56
104.236.230.165 attackbots
$f2bV_matches
2020-02-15 07:41:14
222.254.30.181 attack
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-02-15 07:38:56
82.162.61.68 attackbots
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-15 07:43:59
49.232.39.21 attack
Feb 12 05:30:19 django sshd[48852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.39.21  user=r.r
Feb 12 05:30:21 django sshd[48852]: Failed password for r.r from 49.232.39.21 port 36344 ssh2
Feb 12 05:30:21 django sshd[48854]: Received disconnect from 49.232.39.21: 11: Bye Bye
Feb 12 05:34:03 django sshd[49159]: Invalid user zeng from 49.232.39.21
Feb 12 05:34:03 django sshd[49159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.39.21 
Feb 12 05:34:05 django sshd[49159]: Failed password for invalid user zeng from 49.232.39.21 port 59224 ssh2
Feb 12 05:34:05 django sshd[49160]: Received disconnect from 49.232.39.21: 11: Bye Bye


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.232.39.21
2020-02-15 07:33:44
52.83.45.206 attack
Feb 11 20:58:01 web1 sshd[6782]: Invalid user hdfs from 52.83.45.206
Feb 11 20:58:01 web1 sshd[6782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-52-83-45-206.cn-northwest-1.compute.amazonaws.com.cn 
Feb 11 20:58:03 web1 sshd[6782]: Failed password for invalid user hdfs from 52.83.45.206 port 56158 ssh2
Feb 11 20:58:03 web1 sshd[6782]: Received disconnect from 52.83.45.206: 11: Bye Bye [preauth]
Feb 11 21:13:11 web1 sshd[8034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-52-83-45-206.cn-northwest-1.compute.amazonaws.com.cn  user=r.r
Feb 11 21:13:14 web1 sshd[8034]: Failed password for r.r from 52.83.45.206 port 44202 ssh2
Feb 11 21:13:14 web1 sshd[8034]: Received disconnect from 52.83.45.206: 11: Bye Bye [preauth]
Feb 11 21:15:58 web1 sshd[8370]: Invalid user role1 from 52.83.45.206
Feb 11 21:15:58 web1 sshd[8370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e........
-------------------------------
2020-02-15 07:03:21

Recently Reported IPs

177.144.6.17 148.254.196.31 140.103.30.103 116.87.233.10
13.44.206.149 214.185.241.122 73.151.144.235 68.124.238.19
64.47.10.54 192.219.141.114 67.95.74.34 85.189.58.215
252.170.246.181 87.79.130.204 193.153.195.163 189.166.85.20
184.183.174.92 242.214.120.27 133.106.168.99 126.107.8.179