Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 156.148.138.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2365
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;156.148.138.11.			IN	A

;; AUTHORITY SECTION:
.			473	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021122600 1800 900 604800 86400

;; Query time: 180 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 27 00:11:30 CST 2021
;; MSG SIZE  rcvd: 107
Host info
Host 11.138.148.156.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 11.138.148.156.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
60.169.22.64 attackbotsspam
Autoban   60.169.22.64 AUTH/CONNECT
2019-12-13 02:46:12
103.25.6.73 attack
Invalid user host from 103.25.6.73 port 44469
2019-12-13 03:10:10
61.42.55.243 attack
Autoban   61.42.55.243 AUTH/CONNECT
2019-12-13 02:36:59
54.209.226.55 attack
Autoban   54.209.226.55 AUTH/CONNECT
2019-12-13 03:05:53
54.36.90.100 attack
Autoban   54.36.90.100 AUTH/CONNECT
2019-12-13 03:06:08
159.203.17.176 attackspam
Dec 12 08:19:39 web1 sshd\[14875\]: Invalid user ui from 159.203.17.176
Dec 12 08:19:39 web1 sshd\[14875\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.17.176
Dec 12 08:19:41 web1 sshd\[14875\]: Failed password for invalid user ui from 159.203.17.176 port 47981 ssh2
Dec 12 08:26:55 web1 sshd\[15613\]: Invalid user wwwrun from 159.203.17.176
Dec 12 08:26:55 web1 sshd\[15613\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.17.176
2019-12-13 02:39:07
59.102.143.246 attack
Autoban   59.102.143.246 AUTH/CONNECT
2019-12-13 02:53:17
59.25.203.65 attackspam
Autoban   59.25.203.65 AUTH/CONNECT
2019-12-13 02:49:37
91.109.5.232 attack
91.109.5.232 - - \[12/Dec/2019:18:32:38 +0100\] "POST /wp-login.php HTTP/1.0" 200 6589 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
91.109.5.232 - - \[12/Dec/2019:18:32:39 +0100\] "POST /wp-login.php HTTP/1.0" 200 6402 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
91.109.5.232 - - \[12/Dec/2019:18:32:40 +0100\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-12-13 02:43:16
178.128.150.158 attack
Dec 12 11:59:35 ny01 sshd[15289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.150.158
Dec 12 11:59:37 ny01 sshd[15289]: Failed password for invalid user wwwadmin from 178.128.150.158 port 50072 ssh2
Dec 12 12:05:09 ny01 sshd[15831]: Failed password for root from 178.128.150.158 port 57654 ssh2
2019-12-13 03:14:16
58.8.136.209 attackspambots
Autoban   58.8.136.209 AUTH/CONNECT
2019-12-13 02:55:20
54.37.138.3 attackspambots
Autoban   54.37.138.3 AUTH/CONNECT
2019-12-13 03:03:50
59.27.237.175 attackspam
Autoban   59.27.237.175 AUTH/CONNECT
2019-12-13 02:48:36
58.240.14.235 attackbotsspam
Autoban   58.240.14.235 AUTH/CONNECT
2019-12-13 02:56:34
58.143.7.123 attackbots
Autoban   58.143.7.123 AUTH/CONNECT
2019-12-13 03:01:06

Recently Reported IPs

253.42.69.252 48.90.163.60 140.62.237.114 53.3.94.241
96.109.52.156 82.137.12.184 10.11.175.227 141.0.178.249
30.109.152.165 61.172.74.162 253.106.86.239 73.94.254.109
170.132.227.51 193.229.131.75 92.86.151.245 168.113.9.233
55.129.224.221 105.182.184.102 179.140.175.254 193.167.188.93