Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
159.138.142.161 attackspambots
port scan and connect, tcp 80 (http)
2020-07-23 02:20:21
159.138.149.210 attackspam
do not respect robot.txt
2020-02-29 03:33:45
159.138.149.47 attackbotsspam
Looking for resource vulnerabilities
2020-01-15 09:23:48
159.138.149.148 attackspambots
badbot
2020-01-07 22:29:13
159.138.149.42 attack
Unauthorized access detected from banned ip
2020-01-01 13:13:04
159.138.149.214 attackbots
Unauthorized access detected from banned ip
2019-12-28 16:06:13
159.138.149.107 attack
[Fri Dec 20 21:47:05.500811 2019] [ssl:info] [pid 23331:tid 140202395809536] [client 159.138.149.107:41419] AH02033: No hostname was provided via SNI for a name based virtual host
...
2019-12-21 06:23:57
159.138.148.103 attackbotsspam
badbot
2019-11-27 06:34:19
159.138.149.62 attack
badbot
2019-11-27 06:21:04
159.138.148.145 attack
badbot
2019-11-27 05:34:19
159.138.149.52 attack
badbot
2019-11-27 03:31:07
159.138.148.221 attackbots
badbot
2019-11-27 03:20:43
159.138.149.34 attackspam
badbot
2019-11-25 14:44:27
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.138.14.209
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24038
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.138.14.209.			IN	A

;; AUTHORITY SECTION:
.			306	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 05:09:01 CST 2022
;; MSG SIZE  rcvd: 107
Host info
209.14.138.159.in-addr.arpa domain name pointer ecs-159-138-14-209.compute.hwclouds-dns.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
209.14.138.159.in-addr.arpa	name = ecs-159-138-14-209.compute.hwclouds-dns.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
77.45.84.75 attackbotsspam
Jun  8 05:18:45 mail.srvfarm.net postfix/smtps/smtpd[652504]: warning: 77-45-84-75.sta.asta-net.com.pl[77.45.84.75]: SASL PLAIN authentication failed: 
Jun  8 05:18:45 mail.srvfarm.net postfix/smtps/smtpd[652504]: lost connection after AUTH from 77-45-84-75.sta.asta-net.com.pl[77.45.84.75]
Jun  8 05:18:54 mail.srvfarm.net postfix/smtps/smtpd[653845]: warning: 77-45-84-75.sta.asta-net.com.pl[77.45.84.75]: SASL PLAIN authentication failed: 
Jun  8 05:18:54 mail.srvfarm.net postfix/smtps/smtpd[653845]: lost connection after AUTH from 77-45-84-75.sta.asta-net.com.pl[77.45.84.75]
Jun  8 05:21:31 mail.srvfarm.net postfix/smtpd[671463]: warning: 77-45-84-75.sta.asta-net.com.pl[77.45.84.75]: SASL PLAIN authentication failed:
2020-06-08 18:48:47
80.211.241.87 attackbotsspam
Jun  8 09:05:22 mail.srvfarm.net postfix/smtpd[747983]: lost connection after CONNECT from unknown[80.211.241.87]
Jun  8 09:05:35 mail.srvfarm.net postfix/smtpd[749856]: warning: unknown[80.211.241.87]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  8 09:05:35 mail.srvfarm.net postfix/smtpd[749856]: lost connection after AUTH from unknown[80.211.241.87]
Jun  8 09:06:33 mail.srvfarm.net postfix/smtpd[746296]: warning: unknown[80.211.241.87]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  8 09:06:33 mail.srvfarm.net postfix/smtpd[746296]: lost connection after AUTH from unknown[80.211.241.87]
2020-06-08 18:48:00
87.101.92.28 attackbots
Multiple attempts to login to our HIK camera DVD recorder
2020-06-08 18:11:47
165.22.112.45 attackspam
...
2020-06-08 18:52:29
89.203.144.174 attack
Jun  8 05:13:29 mail.srvfarm.net postfix/smtps/smtpd[652499]: warning: unknown[89.203.144.174]: SASL PLAIN authentication failed: 
Jun  8 05:13:29 mail.srvfarm.net postfix/smtps/smtpd[652499]: lost connection after AUTH from unknown[89.203.144.174]
Jun  8 05:15:47 mail.srvfarm.net postfix/smtps/smtpd[652490]: warning: unknown[89.203.144.174]: SASL PLAIN authentication failed: 
Jun  8 05:15:47 mail.srvfarm.net postfix/smtps/smtpd[652490]: lost connection after AUTH from unknown[89.203.144.174]
Jun  8 05:16:21 mail.srvfarm.net postfix/smtpd[652520]: warning: unknown[89.203.144.174]: SASL PLAIN authentication failed:
2020-06-08 18:47:00
217.112.142.211 attackbots
Jun  8 05:11:25 web01.agentur-b-2.de postfix/smtpd[1315320]: NOQUEUE: reject: RCPT from unknown[217.112.142.211]: 450 4.7.1 : Helo command rejected: Host not found; from= to= proto=ESMTP helo=
Jun  8 05:12:12 web01.agentur-b-2.de postfix/smtpd[1318404]: NOQUEUE: reject: RCPT from unknown[217.112.142.211]: 450 4.7.1 : Helo command rejected: Host not found; from= to= proto=ESMTP helo=
Jun  8 05:12:17 web01.agentur-b-2.de postfix/smtpd[1318404]: NOQUEUE: reject: RCPT from unknown[217.112.142.211]: 450 4.7.1 : Helo command rejected: Host not found; from= to= proto=ESMTP helo=
Jun  8 05:15:26 web01.agentur-b-2.de postfix/smtpd[1319302]: NOQUEUE: reject: RCPT from unknown[217.112.142.211]: 450
2020-06-08 18:32:46
194.135.15.6 attack
Jun  8 05:22:50 web01.agentur-b-2.de postfix/smtpd[1317600]: NOQUEUE: reject: RCPT from unknown[194.135.15.6]: 450 4.7.1 <17358.ru>: Helo command rejected: Host not found; from= to= proto=ESMTP helo=<17358.ru>
Jun  8 05:22:50 web01.agentur-b-2.de postfix/smtpd[1317600]: NOQUEUE: reject: RCPT from unknown[194.135.15.6]: 450 4.7.1 <17358.ru>: Helo command rejected: Host not found; from= to= proto=ESMTP helo=<17358.ru>
Jun  8 05:22:50 web01.agentur-b-2.de postfix/smtpd[1317600]: NOQUEUE: reject: RCPT from unknown[194.135.15.6]: 450 4.7.1 <17358.ru>: Helo command rejected: Host not found; from= to= proto=ESMTP helo=<17358.ru>
Jun  8 05:22:51 web01.agentur-b-2.de postfix/smtpd[1317600]: NOQUEUE: reject: RCPT from unknown[194.135.15.6]: 450 4.7.1 <17358.ru>: Helo command rejected: Host not found; from= to=
2020-06-08 18:34:46
89.145.166.197 attack
2020-06-08T12:37:59.618983snf-827550 sshd[10582]: Failed password for root from 89.145.166.197 port 33924 ssh2
2020-06-08T12:41:15.300482snf-827550 sshd[10613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.145.166.197  user=root
2020-06-08T12:41:17.558695snf-827550 sshd[10613]: Failed password for root from 89.145.166.197 port 37484 ssh2
...
2020-06-08 18:53:03
140.143.249.234 attack
Jun  7 20:45:14 mockhub sshd[12278]: Failed password for root from 140.143.249.234 port 47530 ssh2
...
2020-06-08 18:15:33
112.85.42.186 attackspam
Jun  8 15:28:03 dhoomketu sshd[574550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.186  user=root
Jun  8 15:28:06 dhoomketu sshd[574550]: Failed password for root from 112.85.42.186 port 54827 ssh2
Jun  8 15:28:03 dhoomketu sshd[574550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.186  user=root
Jun  8 15:28:06 dhoomketu sshd[574550]: Failed password for root from 112.85.42.186 port 54827 ssh2
Jun  8 15:28:09 dhoomketu sshd[574550]: Failed password for root from 112.85.42.186 port 54827 ssh2
...
2020-06-08 18:12:39
13.93.65.12 attackbots
Jun  8 09:34:00 web01.agentur-b-2.de postfix/smtps/smtpd[1394020]: warning: unknown[13.93.65.12]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  8 09:36:33 web01.agentur-b-2.de postfix/smtps/smtpd[1396037]: warning: unknown[13.93.65.12]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  8 09:39:01 web01.agentur-b-2.de postfix/smtps/smtpd[1396425]: warning: unknown[13.93.65.12]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  8 09:41:20 web01.agentur-b-2.de postfix/smtps/smtpd[1397544]: warning: unknown[13.93.65.12]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  8 09:43:46 web01.agentur-b-2.de postfix/smtps/smtpd[1397607]: warning: unknown[13.93.65.12]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-06-08 18:32:27
177.44.16.145 attack
Jun  8 05:40:33 mail.srvfarm.net postfix/smtpd[671306]: warning: unknown[177.44.16.145]: SASL PLAIN authentication failed: 
Jun  8 05:40:34 mail.srvfarm.net postfix/smtpd[671306]: lost connection after AUTH from unknown[177.44.16.145]
Jun  8 05:41:30 mail.srvfarm.net postfix/smtps/smtpd[671677]: warning: unknown[177.44.16.145]: SASL PLAIN authentication failed: 
Jun  8 05:41:31 mail.srvfarm.net postfix/smtps/smtpd[671677]: lost connection after AUTH from unknown[177.44.16.145]
Jun  8 05:44:09 mail.srvfarm.net postfix/smtpd[678259]: warning: unknown[177.44.16.145]: SASL PLAIN authentication failed:
2020-06-08 18:27:33
177.44.17.45 attackbots
Jun  8 05:39:20 mail.srvfarm.net postfix/smtps/smtpd[672461]: warning: unknown[177.44.17.45]: SASL PLAIN authentication failed: 
Jun  8 05:39:20 mail.srvfarm.net postfix/smtps/smtpd[672461]: lost connection after AUTH from unknown[177.44.17.45]
Jun  8 05:40:55 mail.srvfarm.net postfix/smtps/smtpd[671677]: warning: unknown[177.44.17.45]: SASL PLAIN authentication failed: 
Jun  8 05:40:58 mail.srvfarm.net postfix/smtps/smtpd[671677]: lost connection after AUTH from unknown[177.44.17.45]
Jun  8 05:46:41 mail.srvfarm.net postfix/smtpd[671308]: warning: unknown[177.44.17.45]: SASL PLAIN authentication failed:
2020-06-08 18:26:58
51.255.150.119 attackbots
odoo8
...
2020-06-08 18:54:47
94.177.229.123 attack
Jun  8 12:34:14 relay postfix/smtpd\[28882\]: warning: unknown\[94.177.229.123\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  8 12:34:32 relay postfix/smtpd\[28882\]: warning: unknown\[94.177.229.123\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  8 12:34:50 relay postfix/smtpd\[2217\]: warning: unknown\[94.177.229.123\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  8 12:35:08 relay postfix/smtpd\[2217\]: warning: unknown\[94.177.229.123\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  8 12:35:26 relay postfix/smtpd\[2214\]: warning: unknown\[94.177.229.123\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-08 18:46:11

Recently Reported IPs

159.138.134.152 159.138.141.191 159.138.145.65 159.138.141.101
159.138.146.229 159.138.152.124 159.138.150.148 159.138.153.216
159.138.20.239 159.138.154.82 159.138.201.206 159.138.213.16
159.138.22.80 159.138.238.151 159.138.230.143 159.138.2.164
159.138.24.250 159.138.241.205 159.138.247.248 159.138.40.205