Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.9.148.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26063
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.9.148.138.			IN	A

;; AUTHORITY SECTION:
.			499	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022012000 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 20 15:41:26 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 138.148.9.164.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.148.9.164.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
192.241.227.144 attack
firewall-block, port(s): 8086/tcp
2020-09-04 21:45:08
113.250.254.107 attackbotsspam
Lines containing failures of 113.250.254.107
Sep  3 18:53:58 hgb10502 sshd[27549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.250.254.107  user=r.r
Sep  3 18:54:00 hgb10502 sshd[27549]: Failed password for r.r from 113.250.254.107 port 24382 ssh2
Sep  3 18:54:01 hgb10502 sshd[27549]: Received disconnect from 113.250.254.107 port 24382:11: Bye Bye [preauth]
Sep  3 18:54:01 hgb10502 sshd[27549]: Disconnected from authenticating user r.r 113.250.254.107 port 24382 [preauth]
Sep  3 18:59:11 hgb10502 sshd[28239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.250.254.107  user=r.r
Sep  3 18:59:13 hgb10502 sshd[28239]: Failed password for r.r from 113.250.254.107 port 24368 ssh2
Sep  3 18:59:15 hgb10502 sshd[28239]: Received disconnect from 113.250.254.107 port 24368:11: Bye Bye [preauth]
Sep  3 18:59:15 hgb10502 sshd[28239]: Disconnected from authenticating user r.r 113.250.254.107 p........
------------------------------
2020-09-04 21:20:02
167.248.133.25 attackspambots
Port scan: Attack repeated for 24 hours
2020-09-04 21:10:48
218.92.0.165 attackbotsspam
Sep  4 09:16:08 NPSTNNYC01T sshd[27919]: Failed password for root from 218.92.0.165 port 18314 ssh2
Sep  4 09:16:21 NPSTNNYC01T sshd[27919]: error: maximum authentication attempts exceeded for root from 218.92.0.165 port 18314 ssh2 [preauth]
Sep  4 09:16:31 NPSTNNYC01T sshd[27934]: Failed password for root from 218.92.0.165 port 47829 ssh2
...
2020-09-04 21:36:24
95.10.184.228 attackbots
95.10.184.228 - - [04/Sep/2020:06:07:51 -0400] "POST /xmlrpc.php HTTP/1.1" 404 208 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/32.0.1664.3 Safari/537.36"
95.10.184.228 - - [04/Sep/2020:06:07:54 -0400] "POST /wordpress/xmlrpc.php HTTP/1.1" 404 218 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/32.0.1664.3 Safari/537.36"
95.10.184.228 - - [04/Sep/2020:06:07:54 -0400] "POST /blog/xmlrpc.php HTTP/1.1" 404 213 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/32.0.1664.3 Safari/537.36"
...
2020-09-04 21:21:39
218.92.0.208 attackbots
Sep  4 13:02:13 IngegnereFirenze sshd[29252]: User root from 218.92.0.208 not allowed because not listed in AllowUsers
...
2020-09-04 21:46:02
139.162.109.43 attackbotsspam
Port scan denied
2020-09-04 21:11:34
140.143.3.130 attackspambots
Invalid user ghost from 140.143.3.130 port 26144
2020-09-04 21:42:26
177.102.239.107 attack
Sep  3 18:49:39 mellenthin postfix/smtpd[20369]: NOQUEUE: reject: RCPT from unknown[177.102.239.107]: 554 5.7.1 Service unavailable; Client host [177.102.239.107] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/177.102.239.107; from= to= proto=ESMTP helo=<177-102-239-107.dsl.telesp.net.br>
2020-09-04 21:46:43
222.186.173.142 attack
Sep  4 03:07:19 web9 sshd\[586\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142  user=root
Sep  4 03:07:21 web9 sshd\[586\]: Failed password for root from 222.186.173.142 port 17024 ssh2
Sep  4 03:07:35 web9 sshd\[586\]: Failed password for root from 222.186.173.142 port 17024 ssh2
Sep  4 03:07:39 web9 sshd\[612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142  user=root
Sep  4 03:07:42 web9 sshd\[612\]: Failed password for root from 222.186.173.142 port 22486 ssh2
2020-09-04 21:12:25
114.35.92.207 attackbotsspam
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-04 21:42:47
49.233.189.161 attackbotsspam
Sep  4 13:24:27 IngegnereFirenze sshd[30324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.189.161  user=root
...
2020-09-04 21:28:42
192.144.187.153 attackspam
2020-08-24 12:54:46,491 fail2ban.actions        [1312]: NOTICE  [sshd] Ban 192.144.187.153
2020-08-24 13:12:51,315 fail2ban.actions        [1312]: NOTICE  [sshd] Ban 192.144.187.153
2020-08-24 13:30:44,923 fail2ban.actions        [1312]: NOTICE  [sshd] Ban 192.144.187.153
2020-08-24 13:48:27,347 fail2ban.actions        [1312]: NOTICE  [sshd] Ban 192.144.187.153
2020-08-24 14:06:19,458 fail2ban.actions        [1312]: NOTICE  [sshd] Ban 192.144.187.153
...
2020-09-04 21:33:03
118.24.2.141 attackspambots
Sep  4 01:13:10 ws26vmsma01 sshd[76298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.2.141
Sep  4 01:13:11 ws26vmsma01 sshd[76298]: Failed password for invalid user ubuntu from 118.24.2.141 port 44794 ssh2
...
2020-09-04 21:26:53
180.242.181.111 attack
Port probing on unauthorized port 445
2020-09-04 21:16:58

Recently Reported IPs

10.188.192.92 202.85.231.70 19.235.132.104 76.72.180.219
99.214.55.164 212.10.118.217 84.216.231.32 103.90.251.91
11.90.150.198 166.184.39.33 118.140.26.18 32.221.61.239
181.46.66.243 49.51.242.80 123.100.18.7 241.64.166.56
139.59.236.214 159.44.184.88 242.23.194.98 245.79.243.37