Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Saint Paul

Region: Minnesota

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 156.142.57.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44561
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;156.142.57.138.			IN	A

;; AUTHORITY SECTION:
.			569	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011500 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 15 20:23:32 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 138.57.142.156.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.57.142.156.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
157.230.151.241 attack
detected by Fail2Ban
2020-04-27 16:29:29
51.161.8.70 attack
SSH brute force attempt
2020-04-27 16:11:31
88.245.161.71 attackbotsspam
Automatic report - Port Scan Attack
2020-04-27 16:26:06
104.208.234.21 attack
Apr 27 05:47:46 srv01 sshd[17656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.208.234.21  user=root
Apr 27 05:47:48 srv01 sshd[17656]: Failed password for root from 104.208.234.21 port 44758 ssh2
Apr 27 05:54:26 srv01 sshd[17849]: Invalid user wa from 104.208.234.21 port 48934
Apr 27 05:54:26 srv01 sshd[17849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.208.234.21
Apr 27 05:54:26 srv01 sshd[17849]: Invalid user wa from 104.208.234.21 port 48934
Apr 27 05:54:28 srv01 sshd[17849]: Failed password for invalid user wa from 104.208.234.21 port 48934 ssh2
...
2020-04-27 16:16:35
109.227.63.3 attackspam
k+ssh-bruteforce
2020-04-27 16:15:38
103.79.154.11 attackspambots
20/4/26@23:54:06: FAIL: Alarm-Network address from=103.79.154.11
20/4/26@23:54:06: FAIL: Alarm-Network address from=103.79.154.11
...
2020-04-27 16:31:54
18.139.255.57 attackspambots
...
2020-04-27 16:26:24
188.94.27.21 attackspam
Fail2Ban Ban Triggered
2020-04-27 16:05:47
125.24.199.226 attackbotsspam
Honeypot attack, port: 81, PTR: node-13he.pool-125-24.dynamic.totinternet.net.
2020-04-27 16:06:03
207.46.13.92 attackbotsspam
Automatic report - Banned IP Access
2020-04-27 16:34:22
54.38.188.103 attack
Apr 27 11:05:25 lukav-desktop sshd\[30701\]: Invalid user library from 54.38.188.103
Apr 27 11:05:25 lukav-desktop sshd\[30701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.188.103
Apr 27 11:05:26 lukav-desktop sshd\[30701\]: Failed password for invalid user library from 54.38.188.103 port 54462 ssh2
Apr 27 11:12:35 lukav-desktop sshd\[12150\]: Invalid user client from 54.38.188.103
Apr 27 11:12:35 lukav-desktop sshd\[12150\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.188.103
2020-04-27 16:18:06
51.75.76.201 attackbots
Apr 27 09:41:34 vpn01 sshd[1355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.76.201
Apr 27 09:41:36 vpn01 sshd[1355]: Failed password for invalid user anitha from 51.75.76.201 port 42732 ssh2
...
2020-04-27 15:58:55
190.129.60.124 attackspam
Apr 27 07:35:19 hosting sshd[21408]: Invalid user renew from 190.129.60.124 port 42202
...
2020-04-27 16:19:30
180.76.177.195 attackbotsspam
Invalid user admin from 180.76.177.195 port 34376
2020-04-27 16:18:36
213.37.130.21 attack
Apr 27 04:41:35 sshgateway sshd\[14688\]: Invalid user bxm from 213.37.130.21
Apr 27 04:41:35 sshgateway sshd\[14688\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.37.130.21.static.user.ono.com
Apr 27 04:41:37 sshgateway sshd\[14688\]: Failed password for invalid user bxm from 213.37.130.21 port 37786 ssh2
2020-04-27 16:35:34

Recently Reported IPs

160.128.207.172 226.207.147.33 25.197.155.198 156.87.129.71
51.46.5.172 196.62.197.61 93.183.147.128 187.119.53.72
65.7.24.198 28.196.33.142 8.73.69.182 215.29.173.249
139.208.8.250 182.225.75.206 210.245.8.134 38.19.80.73
33.231.88.31 74.240.240.162 1.11.94.101 36.107.117.25