Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.64.45.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10695
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.64.45.138.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022012900 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 29 16:09:23 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 138.45.64.159.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.45.64.159.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
122.252.255.226 attackbots
Unauthorized connection attempt from IP address 122.252.255.226 on Port 445(SMB)
2020-07-16 23:31:45
141.98.10.208 attackbots
Jul 16 17:00:18 srv01 postfix/smtpd\[6827\]: warning: unknown\[141.98.10.208\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 17:00:38 srv01 postfix/smtpd\[6827\]: warning: unknown\[141.98.10.208\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 17:01:44 srv01 postfix/smtpd\[6827\]: warning: unknown\[141.98.10.208\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 17:02:31 srv01 postfix/smtpd\[17009\]: warning: unknown\[141.98.10.208\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 17:03:48 srv01 postfix/smtpd\[17129\]: warning: unknown\[141.98.10.208\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-16 23:04:22
125.99.159.93 attackbots
Jul 16 22:01:49 webhost01 sshd[11340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.99.159.93
Jul 16 22:01:51 webhost01 sshd[11340]: Failed password for invalid user hkd from 125.99.159.93 port 57307 ssh2
...
2020-07-16 23:05:58
13.67.46.188 attackspam
SSH authentication failure x 6 reported by Fail2Ban
...
2020-07-16 23:09:45
43.254.59.246 attack
Jul 16 14:49:48 ip-172-31-62-245 sshd\[20438\]: Invalid user ashwin from 43.254.59.246\
Jul 16 14:49:50 ip-172-31-62-245 sshd\[20438\]: Failed password for invalid user ashwin from 43.254.59.246 port 53368 ssh2\
Jul 16 14:54:17 ip-172-31-62-245 sshd\[20471\]: Invalid user orangepi from 43.254.59.246\
Jul 16 14:54:19 ip-172-31-62-245 sshd\[20471\]: Failed password for invalid user orangepi from 43.254.59.246 port 49046 ssh2\
Jul 16 14:58:40 ip-172-31-62-245 sshd\[20495\]: Invalid user varnish from 43.254.59.246\
2020-07-16 23:26:40
111.229.237.58 attack
Jul 16 16:57:46 OPSO sshd\[11025\]: Invalid user elk from 111.229.237.58 port 43046
Jul 16 16:57:46 OPSO sshd\[11025\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.237.58
Jul 16 16:57:48 OPSO sshd\[11025\]: Failed password for invalid user elk from 111.229.237.58 port 43046 ssh2
Jul 16 17:02:07 OPSO sshd\[12216\]: Invalid user vc from 111.229.237.58 port 56308
Jul 16 17:02:07 OPSO sshd\[12216\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.237.58
2020-07-16 23:15:08
218.92.0.208 attack
Jul 16 16:50:52 server sshd[9436]: Failed password for root from 218.92.0.208 port 48558 ssh2
Jul 16 16:50:55 server sshd[9436]: Failed password for root from 218.92.0.208 port 48558 ssh2
Jul 16 16:50:59 server sshd[9436]: Failed password for root from 218.92.0.208 port 48558 ssh2
2020-07-16 23:24:19
61.177.172.177 attackbots
2020-07-16T15:13:55.267150abusebot-2.cloudsearch.cf sshd[7852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.177  user=root
2020-07-16T15:13:57.862226abusebot-2.cloudsearch.cf sshd[7852]: Failed password for root from 61.177.172.177 port 49394 ssh2
2020-07-16T15:14:01.951205abusebot-2.cloudsearch.cf sshd[7852]: Failed password for root from 61.177.172.177 port 49394 ssh2
2020-07-16T15:13:55.267150abusebot-2.cloudsearch.cf sshd[7852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.177  user=root
2020-07-16T15:13:57.862226abusebot-2.cloudsearch.cf sshd[7852]: Failed password for root from 61.177.172.177 port 49394 ssh2
2020-07-16T15:14:01.951205abusebot-2.cloudsearch.cf sshd[7852]: Failed password for root from 61.177.172.177 port 49394 ssh2
2020-07-16T15:13:55.267150abusebot-2.cloudsearch.cf sshd[7852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser
...
2020-07-16 23:18:18
1.214.215.236 attackspambots
Jul 16 20:25:57 gw1 sshd[9345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.214.215.236
Jul 16 20:25:59 gw1 sshd[9345]: Failed password for invalid user user3 from 1.214.215.236 port 46016 ssh2
...
2020-07-16 23:30:37
103.56.113.224 attack
Jul 16 17:40:01 hosting sshd[30171]: Invalid user cloud from 103.56.113.224 port 60382
...
2020-07-16 23:30:52
192.241.236.149 attackbots
From CCTV User Interface Log
...::ffff:192.241.236.149 - - [16/Jul/2020:09:48:48 +0000] "-" 400 179
...
2020-07-16 23:19:15
46.38.145.5 attack
Jul 17 00:30:31 mx1 postfix/smtpd\[1070\]: warning: unknown\[46.38.145.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6Jul 17 00:31:14 mx1 postfix/smtpd\[1070\]: warning: unknown\[46.38.145.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6Jul 17 00:31:56 mx1 postfix/smtpd\[1070\]: warning: unknown\[46.38.145.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6Jul 17 00:32:40 mx1 postfix/smtpd\[1070\]: warning: unknown\[46.38.145.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6Jul 17 00:33:23 mx1 postfix/smtpd\[1070\]: warning: unknown\[46.38.145.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6Jul 17 00:34:07 mx1 postfix/smtpd\[1070\]: warning: unknown\[46.38.145.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6Jul 17 00:34:50 mx1 postfix/smtpd\[1201\]: warning: unknown\[46.38.145.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6Jul 17 00:35:32 mx1 postfix/smtpd\[1201\]: warning: unknown\[46.38.145.5\]: SASL LOGIN authentication failed: VXNlcm5hbWU6Jul 17 00:36:17 mx1 post
...
2020-07-16 23:39:16
49.233.166.113 attackspambots
Jul 16 16:53:43 ovpn sshd\[24144\]: Invalid user orca from 49.233.166.113
Jul 16 16:53:43 ovpn sshd\[24144\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.166.113
Jul 16 16:53:45 ovpn sshd\[24144\]: Failed password for invalid user orca from 49.233.166.113 port 60526 ssh2
Jul 16 17:12:54 ovpn sshd\[28808\]: Invalid user hi from 49.233.166.113
Jul 16 17:12:54 ovpn sshd\[28808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.166.113
2020-07-16 23:36:29
52.242.77.32 attackspambots
3 failed attempts at connecting to SSH.
2020-07-16 23:09:08
115.135.128.42 attack
Automatic report - Port Scan Attack
2020-07-16 22:58:51

Recently Reported IPs

162.61.167.159 150.123.166.191 171.124.77.11 57.3.95.35
185.63.253.135 33.143.223.166 78.83.41.115 205.146.163.240
16.177.188.112 108.215.107.216 134.74.79.174 17.86.215.248
129.180.94.99 113.140.105.94 245.148.132.23 224.68.205.27
196.111.34.62 229.115.100.47 10.33.246.238 164.17.215.124