Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 160.240.138.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13286
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;160.240.138.157.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022600 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 16:55:59 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 157.138.240.160.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 157.138.240.160.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
190.145.78.66 attackbots
Sep 16 23:44:33 vps691689 sshd[9907]: Failed password for root from 190.145.78.66 port 59480 ssh2
Sep 16 23:49:22 vps691689 sshd[9986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.78.66
...
2019-09-17 06:08:10
103.38.194.139 attackbotsspam
Sep 17 00:14:24 root sshd[27375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.38.194.139 
Sep 17 00:14:25 root sshd[27375]: Failed password for invalid user demo from 103.38.194.139 port 48694 ssh2
Sep 17 00:19:31 root sshd[27424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.38.194.139 
...
2019-09-17 06:20:24
106.13.119.163 attackbotsspam
Sep 16 11:34:18 auw2 sshd\[22542\]: Invalid user abdellaue from 106.13.119.163
Sep 16 11:34:18 auw2 sshd\[22542\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.119.163
Sep 16 11:34:20 auw2 sshd\[22542\]: Failed password for invalid user abdellaue from 106.13.119.163 port 53616 ssh2
Sep 16 11:38:12 auw2 sshd\[22915\]: Invalid user melissa from 106.13.119.163
Sep 16 11:38:12 auw2 sshd\[22915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.119.163
2019-09-17 05:49:52
189.133.75.235 attackbots
Automatic report - Port Scan Attack
2019-09-17 05:51:56
123.21.241.1 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-16 18:31:59,642 INFO [amun_request_handler] PortScan Detected on Port: 445 (123.21.241.1)
2019-09-17 06:30:34
114.67.80.41 attackspam
Sep 16 11:39:40 eddieflores sshd\[29686\]: Invalid user sinus from 114.67.80.41
Sep 16 11:39:40 eddieflores sshd\[29686\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.80.41
Sep 16 11:39:42 eddieflores sshd\[29686\]: Failed password for invalid user sinus from 114.67.80.41 port 60314 ssh2
Sep 16 11:43:50 eddieflores sshd\[30070\]: Invalid user shan from 114.67.80.41
Sep 16 11:43:50 eddieflores sshd\[30070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.80.41
2019-09-17 05:56:18
24.221.19.57 attackbots
(sshd) Failed SSH login from 24.221.19.57 (US/United States/ip-24-221-19-57.atlnga.spcsdns.net): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Sep 16 14:55:20 host sshd[79532]: Invalid user pi from 24.221.19.57 port 34234
2019-09-17 06:25:43
189.115.92.79 attackspambots
Sep 16 21:53:32 hcbbdb sshd\[21841\]: Invalid user saverill from 189.115.92.79
Sep 16 21:53:32 hcbbdb sshd\[21841\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.115.92.79
Sep 16 21:53:34 hcbbdb sshd\[21841\]: Failed password for invalid user saverill from 189.115.92.79 port 55154 ssh2
Sep 16 22:01:34 hcbbdb sshd\[22680\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.115.92.79  user=root
Sep 16 22:01:35 hcbbdb sshd\[22680\]: Failed password for root from 189.115.92.79 port 39818 ssh2
2019-09-17 06:21:13
218.234.206.107 attackspambots
Reported by AbuseIPDB proxy server.
2019-09-17 06:15:03
138.197.195.52 attackbotsspam
Sep 17 00:01:00 root sshd[27206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.195.52 
Sep 17 00:01:02 root sshd[27206]: Failed password for invalid user music from 138.197.195.52 port 59686 ssh2
Sep 17 00:05:21 root sshd[27241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.195.52 
...
2019-09-17 06:07:41
70.26.24.254 attackbotsspam
tcp 5555
2019-09-17 06:20:46
185.53.88.81 attack
" "
2019-09-17 06:00:39
119.76.53.199 attackspam
Automatic report - Port Scan Attack
2019-09-17 06:13:25
54.37.136.183 attack
Sep 16 18:11:37 plusreed sshd[14119]: Invalid user admin from 54.37.136.183
...
2019-09-17 06:23:53
113.190.253.221 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-16 18:33:53,726 INFO [amun_request_handler] PortScan Detected on Port: 445 (113.190.253.221)
2019-09-17 06:21:32

Recently Reported IPs

18.166.78.165 25.3.57.66 151.199.149.199 157.243.115.162
217.85.220.117 169.248.49.165 145.225.201.117 217.83.76.131
194.232.122.113 83.96.164.81 108.31.146.231 62.96.97.211
34.123.56.185 18.226.192.82 44.78.183.158 50.241.99.137
49.154.190.232 29.210.209.153 217.127.69.250 182.137.53.78