Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.92.138.24
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34756
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.92.138.24.			IN	A

;; AUTHORITY SECTION:
.			589	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023052301 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 24 13:54:40 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 24.138.92.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 24.138.92.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
101.255.44.14 attackbotsspam
Unauthorized connection attempt from IP address 101.255.44.14 on Port 445(SMB)
2020-01-11 19:57:52
58.69.12.106 attackspam
Unauthorized connection attempt from IP address 58.69.12.106 on Port 445(SMB)
2020-01-11 20:08:03
196.29.164.164 attack
Unauthorized connection attempt from IP address 196.29.164.164 on Port 445(SMB)
2020-01-11 20:04:41
121.122.81.205 attackbots
Unauthorized connection attempt from IP address 121.122.81.205 on Port 445(SMB)
2020-01-11 20:17:24
118.69.109.37 attackspam
Unauthorized connection attempt from IP address 118.69.109.37 on Port 445(SMB)
2020-01-11 20:05:09
14.184.250.49 attackbots
Unauthorized connection attempt from IP address 14.184.250.49 on Port 445(SMB)
2020-01-11 19:52:15
27.72.31.254 attackspambots
Unauthorized connection attempt from IP address 27.72.31.254 on Port 445(SMB)
2020-01-11 19:42:55
112.229.30.24 attack
Jan 10 23:47:48 debian sshd[25277]: Invalid user pi from 112.229.30.24 port 45036
Jan 10 23:47:48 debian sshd[25278]: Invalid user pi from 112.229.30.24 port 45040
Jan 10 23:47:48 debian sshd[25277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.229.30.24 
Jan 10 23:47:48 debian sshd[25278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.229.30.24 
Jan 10 23:47:50 debian sshd[25277]: Failed password for invalid user pi from 112.229.30.24 port 45036 ssh2
...
2020-01-11 20:02:43
122.162.206.123 attackspam
Unauthorized connection attempt from IP address 122.162.206.123 on Port 445(SMB)
2020-01-11 20:28:00
222.242.223.75 attack
Jan 11 07:15:23 dedicated sshd[6350]: Invalid user db2inst3 from 222.242.223.75 port 34689
2020-01-11 20:24:05
49.145.106.162 attackbots
Unauthorized connection attempt from IP address 49.145.106.162 on Port 445(SMB)
2020-01-11 20:03:04
116.104.137.104 attack
Unauthorized connection attempt from IP address 116.104.137.104 on Port 445(SMB)
2020-01-11 20:20:16
123.24.206.106 attackbotsspam
Unauthorized connection attempt from IP address 123.24.206.106 on Port 445(SMB)
2020-01-11 20:09:25
1.20.238.112 attackbots
Unauthorized connection attempt from IP address 1.20.238.112 on Port 445(SMB)
2020-01-11 20:14:50
123.148.208.167 attackbotsspam
"POST /xmlrpc.php HTTP/1.1" 403
"POST /xmlrpc.php HTTP/1.1" 403
2020-01-11 19:49:21

Recently Reported IPs

35.21.243.234 7.78.3.101 182.235.156.211 18.208.227.77
23.75.120.168 83.174.63.97 224.97.52.223 54.4.126.81
36.141.113.87 206.197.231.48 90.110.50.221 79.18.191.155
115.48.74.68 255.111.131.224 170.63.37.240 185.135.130.90
23.51.212.183 41.175.171.50 128.105.145.82 24.131.26.242