Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 16.138.18.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18286
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;16.138.18.133.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021501 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 04:56:42 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 133.18.138.16.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 133.18.138.16.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.42.4 attackbotsspam
Oct 13 23:23:52 dcd-gentoo sshd[5520]: User root from 222.186.42.4 not allowed because none of user's groups are listed in AllowGroups
Oct 13 23:23:57 dcd-gentoo sshd[5520]: error: PAM: Authentication failure for illegal user root from 222.186.42.4
Oct 13 23:23:52 dcd-gentoo sshd[5520]: User root from 222.186.42.4 not allowed because none of user's groups are listed in AllowGroups
Oct 13 23:23:57 dcd-gentoo sshd[5520]: error: PAM: Authentication failure for illegal user root from 222.186.42.4
Oct 13 23:23:52 dcd-gentoo sshd[5520]: User root from 222.186.42.4 not allowed because none of user's groups are listed in AllowGroups
Oct 13 23:23:57 dcd-gentoo sshd[5520]: error: PAM: Authentication failure for illegal user root from 222.186.42.4
Oct 13 23:23:57 dcd-gentoo sshd[5520]: Failed keyboard-interactive/pam for invalid user root from 222.186.42.4 port 52110 ssh2
...
2019-10-14 05:26:24
58.162.140.172 attack
Oct 14 00:00:28 sauna sshd[170248]: Failed password for root from 58.162.140.172 port 48394 ssh2
...
2019-10-14 05:13:59
167.99.77.94 attack
Mar 12 18:56:21 yesfletchmain sshd\[24884\]: User root from 167.99.77.94 not allowed because not listed in AllowUsers
Mar 12 18:56:21 yesfletchmain sshd\[24884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.77.94  user=root
Mar 12 18:56:23 yesfletchmain sshd\[24884\]: Failed password for invalid user root from 167.99.77.94 port 49892 ssh2
Mar 12 19:01:24 yesfletchmain sshd\[25031\]: User root from 167.99.77.94 not allowed because not listed in AllowUsers
Mar 12 19:01:24 yesfletchmain sshd\[25031\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.77.94  user=root
...
2019-10-14 05:18:10
222.186.15.160 attackbots
Oct 14 02:47:40 areeb-Workstation sshd[17295]: Failed password for root from 222.186.15.160 port 17446 ssh2
Oct 14 02:47:43 areeb-Workstation sshd[17295]: Failed password for root from 222.186.15.160 port 17446 ssh2
...
2019-10-14 05:19:35
46.61.235.111 attackbotsspam
Oct 13 20:47:32 hcbbdb sshd\[4395\]: Invalid user Passw0rd!@\#\$ from 46.61.235.111
Oct 13 20:47:32 hcbbdb sshd\[4395\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.61.235.111
Oct 13 20:47:33 hcbbdb sshd\[4395\]: Failed password for invalid user Passw0rd!@\#\$ from 46.61.235.111 port 44864 ssh2
Oct 13 20:51:49 hcbbdb sshd\[4836\]: Invalid user Schule2017 from 46.61.235.111
Oct 13 20:51:49 hcbbdb sshd\[4836\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.61.235.111
2019-10-14 04:52:03
69.167.148.63 attack
schuetzenmusikanten.de 69.167.148.63 \[13/Oct/2019:22:15:33 +0200\] "POST /wp-login.php HTTP/1.1" 200 5681 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
schuetzenmusikanten.de 69.167.148.63 \[13/Oct/2019:22:15:35 +0200\] "POST /wp-login.php HTTP/1.1" 200 5647 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-10-14 05:21:20
222.186.31.145 attackspambots
Oct 13 23:05:21 MK-Soft-Root2 sshd[8434]: Failed password for root from 222.186.31.145 port 49194 ssh2
Oct 13 23:05:25 MK-Soft-Root2 sshd[8434]: Failed password for root from 222.186.31.145 port 49194 ssh2
...
2019-10-14 05:08:36
168.167.85.255 attack
May 14 20:26:58 yesfletchmain sshd\[12627\]: Invalid user dh from 168.167.85.255 port 33992
May 14 20:26:58 yesfletchmain sshd\[12627\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.167.85.255
May 14 20:27:00 yesfletchmain sshd\[12627\]: Failed password for invalid user dh from 168.167.85.255 port 33992 ssh2
May 14 20:36:12 yesfletchmain sshd\[12809\]: Invalid user deploy from 168.167.85.255 port 32995
May 14 20:36:12 yesfletchmain sshd\[12809\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.167.85.255
...
2019-10-14 05:02:51
132.232.2.184 attackspambots
Automatic report - Banned IP Access
2019-10-14 05:24:22
212.129.138.67 attack
2019-10-13T20:16:22.151580abusebot-8.cloudsearch.cf sshd\[18150\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.138.67  user=root
2019-10-14 04:45:20
130.61.88.249 attack
Oct 13 20:37:00 venus sshd\[20512\]: Invalid user Bitter@123 from 130.61.88.249 port 63124
Oct 13 20:37:00 venus sshd\[20512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.88.249
Oct 13 20:37:02 venus sshd\[20512\]: Failed password for invalid user Bitter@123 from 130.61.88.249 port 63124 ssh2
...
2019-10-14 04:50:26
222.186.180.41 attackbots
10/13/2019-16:51:25.857431 222.186.180.41 Protocol: 6 ET SCAN Potential SSH Scan
2019-10-14 04:52:24
103.105.195.230 attackbots
WordPress login Brute force / Web App Attack on client site.
2019-10-14 05:22:51
59.13.139.42 attack
Oct 13 22:15:59 host sshd\[36263\]: Invalid user stacee from 59.13.139.42 port 40966
Oct 13 22:15:59 host sshd\[36263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.13.139.42
...
2019-10-14 05:06:38
193.112.13.35 attackspam
2019-10-13T20:28:29.222107shield sshd\[22331\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.13.35  user=root
2019-10-13T20:28:31.618489shield sshd\[22331\]: Failed password for root from 193.112.13.35 port 46488 ssh2
2019-10-13T20:32:38.986670shield sshd\[24415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.13.35  user=root
2019-10-13T20:32:41.225706shield sshd\[24415\]: Failed password for root from 193.112.13.35 port 56064 ssh2
2019-10-13T20:36:46.271547shield sshd\[26677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.13.35  user=root
2019-10-14 04:53:46

Recently Reported IPs

125.78.11.8 234.130.215.192 221.137.24.207 60.17.241.52
237.180.53.208 248.15.154.221 235.249.179.74 142.171.183.65
65.5.243.17 98.34.216.202 170.252.243.228 60.113.199.168
141.250.99.104 162.2.195.172 90.66.85.57 52.4.176.99
120.88.137.180 54.245.24.236 56.157.225.204 12.136.38.103