Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Mexico

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
189.213.138.7 attack
Automatic report - Port Scan Attack
2020-04-22 06:39:58
189.213.138.224 attack
*Port Scan* detected from 189.213.138.224 (MX/Mexico/-). 4 hits in the last 60 seconds
2019-11-21 18:43:15
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 189.213.138.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46360
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;189.213.138.106.		IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 03:14:25 CST 2022
;; MSG SIZE  rcvd: 108
Host info
106.138.213.189.in-addr.arpa domain name pointer 189-213-138-106.static.axtel.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
106.138.213.189.in-addr.arpa	name = 189-213-138-106.static.axtel.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
111.231.121.62 attackspambots
Triggered by Fail2Ban at Vostok web server
2020-01-18 02:41:21
198.20.99.130 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-18 02:17:05
159.89.201.59 attackspambots
Unauthorized connection attempt detected from IP address 159.89.201.59 to port 2220 [J]
2020-01-18 02:34:43
45.78.5.60 attack
Unauthorized connection attempt detected from IP address 45.78.5.60 to port 2220 [J]
2020-01-18 02:48:57
35.199.104.164 attackbotsspam
Unauthorized connection attempt detected from IP address 35.199.104.164 to port 2220 [J]
2020-01-18 02:49:35
106.13.84.151 attackbots
Unauthorized connection attempt detected from IP address 106.13.84.151 to port 2220 [J]
2020-01-18 02:42:11
41.66.18.80 attack
1579265969 - 01/17/2020 13:59:29 Host: 41.66.18.80/41.66.18.80 Port: 445 TCP Blocked
2020-01-18 02:20:27
61.177.144.130 attackspam
Unauthorized connection attempt detected from IP address 61.177.144.130 to port 2220 [J]
2020-01-18 02:19:00
79.133.1.21 attackspam
auto-add
2020-01-18 02:43:31
119.42.175.200 attackbotsspam
SSH Brute-Forcing (server1)
2020-01-18 02:39:10
218.92.0.158 attack
Jan 17 19:14:45 legacy sshd[10186]: Failed password for root from 218.92.0.158 port 47156 ssh2
Jan 17 19:14:58 legacy sshd[10186]: error: maximum authentication attempts exceeded for root from 218.92.0.158 port 47156 ssh2 [preauth]
Jan 17 19:15:04 legacy sshd[10194]: Failed password for root from 218.92.0.158 port 14441 ssh2
...
2020-01-18 02:16:35
106.12.137.226 attackspam
Unauthorized connection attempt detected from IP address 106.12.137.226 to port 2220 [J]
2020-01-18 02:42:38
157.245.98.160 attackbots
Unauthorized connection attempt detected from IP address 157.245.98.160 to port 2220 [J]
2020-01-18 02:35:06
46.105.29.160 attackbots
2020-01-17 02:53:26 server sshd[10061]: Failed password for invalid user zq from 46.105.29.160 port 55270 ssh2
2020-01-18 02:48:09
111.229.185.102 attack
Invalid user purple from 111.229.185.102 port 56972
2020-01-18 02:41:41

Recently Reported IPs

111.235.67.210 110.18.103.194 218.87.158.154 36.143.14.159
185.139.27.64 61.53.90.188 210.210.217.49 103.107.92.170
45.33.7.49 187.178.92.220 152.200.154.55 42.230.35.180
93.29.255.3 162.142.125.252 190.13.190.237 89.39.105.36
58.16.141.26 221.15.21.255 222.247.123.101 66.181.160.18