Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.11.45.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44709
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;161.11.45.138.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012801 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 01:48:25 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 138.45.11.161.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 161.11.45.138.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
106.12.138.72 attack
$f2bV_matches
2020-04-29 19:19:57
192.185.4.100 attackbots
Website hacking attempt: Improper php file access [php file]
2020-04-29 19:06:37
213.145.145.34 attackspam
Apr 29 13:12:49 cloud sshd[7196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.145.145.34 
Apr 29 13:12:51 cloud sshd[7196]: Failed password for invalid user test from 213.145.145.34 port 51531 ssh2
2020-04-29 19:39:18
157.230.226.254 attack
Invalid user ps from 157.230.226.254 port 36620
2020-04-29 19:11:47
82.148.92.114 attack
[Aegis] @ 2019-07-02 04:39:56  0100 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack
2020-04-29 19:26:22
103.108.157.170 attackbots
Brute force attempt
2020-04-29 19:42:37
85.187.218.189 attack
Apr 29 11:09:00 debian-2gb-nbg1-2 kernel: \[10410262.699411\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=85.187.218.189 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=12684 PROTO=TCP SPT=42721 DPT=30077 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-29 19:12:35
82.196.15.195 attackspambots
SSH Brute-Force Attack
2020-04-29 19:26:00
82.64.32.76 attack
Invalid user planning from 82.64.32.76 port 35816
2020-04-29 19:17:09
42.200.80.42 attackbots
Wordpress malicious attack:[sshd]
2020-04-29 19:23:54
178.62.233.203 attack
178.62.233.203 - - \[29/Apr/2020:11:39:42 +0200\] "POST /wp-login.php HTTP/1.1" 200 9936 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
178.62.233.203 - - \[29/Apr/2020:11:39:43 +0200\] "POST /wp-login.php HTTP/1.1" 200 9771 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2020-04-29 19:32:17
51.178.87.248 attackbots
Found by fail2ban
2020-04-29 19:29:40
92.53.99.80 attackbotsspam
frenzy
2020-04-29 19:25:21
101.71.129.239 attackbotsspam
Invalid user jian from 101.71.129.239 port 6812
2020-04-29 19:22:29
14.18.118.44 attackbots
Apr 29 09:44:18 jane sshd[13950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.18.118.44 
Apr 29 09:44:20 jane sshd[13950]: Failed password for invalid user steve from 14.18.118.44 port 49590 ssh2
...
2020-04-29 19:07:09

Recently Reported IPs

170.230.177.180 213.136.208.136 247.161.120.44 202.101.185.24
161.1.223.172 221.82.254.46 223.242.123.130 94.30.70.24
213.40.33.108 9.188.63.251 179.112.35.103 8.217.47.197
156.190.178.222 228.52.207.189 103.240.147.178 227.20.41.170
171.202.190.215 25.8.151.137 33.131.93.54 226.216.121.248