Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Mexico

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 189.213.146.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41536
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;189.213.146.138.		IN	A

;; AUTHORITY SECTION:
.			501	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 103 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 11:23:33 CST 2022
;; MSG SIZE  rcvd: 108
Host info
138.146.213.189.in-addr.arpa domain name pointer 189-213-146-138.static.axtel.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.146.213.189.in-addr.arpa	name = 189-213-146-138.static.axtel.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
35.242.214.242 attack
35.242.214.242 - - [24/Sep/2020:20:39:12 +0000] "POST /wp-login.php HTTP/1.1" 200 2077 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-"
35.242.214.242 - - [24/Sep/2020:20:39:14 +0000] "POST /wp-login.php HTTP/1.1" 200 2055 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-"
35.242.214.242 - - [24/Sep/2020:20:39:16 +0000] "POST /wp-login.php HTTP/1.1" 200 2052 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-"
35.242.214.242 - - [24/Sep/2020:20:39:17 +0000] "POST /wp-login.php HTTP/1.1" 200 2052 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-"
35.242.214.242 - - [24/Sep/2020:20:39:18 +0000] "POST /xmlrpc.php HTTP/1.1" 200 236 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-"
2020-09-25 08:28:04
13.82.233.17 attackbotsspam
Scanned 6 times in the last 24 hours on port 22
2020-09-25 08:45:17
58.87.72.42 attackbotsspam
Time:     Thu Sep 24 21:17:17 2020 +0000
IP:       58.87.72.42 (CN/China/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 24 21:08:59 activeserver sshd[17470]: Failed password for invalid user deployment from 58.87.72.42 port 36309 ssh2
Sep 24 21:12:50 activeserver sshd[31360]: Invalid user ops from 58.87.72.42 port 20597
Sep 24 21:12:52 activeserver sshd[31360]: Failed password for invalid user ops from 58.87.72.42 port 20597 ssh2
Sep 24 21:17:12 activeserver sshd[9818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.72.42  user=postgres
Sep 24 21:17:14 activeserver sshd[9818]: Failed password for postgres from 58.87.72.42 port 61422 ssh2
2020-09-25 08:17:28
129.204.82.4 attackspam
SSH Invalid Login
2020-09-25 08:35:33
128.199.198.138 attackbotsspam
Brute%20Force%20SSH
2020-09-25 08:48:38
20.194.40.75 attackbotsspam
[f2b] sshd bruteforce, retries: 1
2020-09-25 08:27:17
23.236.254.130 attack
Automatic report - Banned IP Access
2020-09-25 08:32:46
51.124.49.66 attackspam
Sep 24 21:03:42 firewall sshd[18918]: Invalid user dbnet from 51.124.49.66
Sep 24 21:03:44 firewall sshd[18918]: Failed password for invalid user dbnet from 51.124.49.66 port 13656 ssh2
Sep 24 21:07:14 firewall sshd[18982]: Invalid user 18.132.211.161 from 51.124.49.66
...
2020-09-25 08:10:24
103.145.13.234 attackspam
Multiport scan : 12 ports scanned 6910 6969 6970 7788 8887 9611 9612 9613 9671 9672 9696 9793
2020-09-25 08:32:27
13.78.149.65 attackbots
Sep 25 02:23:08 vmd26974 sshd[12156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.78.149.65
Sep 25 02:23:11 vmd26974 sshd[12156]: Failed password for invalid user zaindoo from 13.78.149.65 port 1024 ssh2
...
2020-09-25 08:36:50
115.99.254.148 attackspam
DATE:2020-09-24 21:51:32, IP:115.99.254.148, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-09-25 08:12:30
14.56.180.103 attackbotsspam
Time:     Thu Sep 24 13:30:41 2020 +0000
IP:       14.56.180.103 (KR/South Korea/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 24 13:23:54 activeserver sshd[7557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.56.180.103  user=postgres
Sep 24 13:23:56 activeserver sshd[7557]: Failed password for postgres from 14.56.180.103 port 52324 ssh2
Sep 24 13:27:09 activeserver sshd[16123]: Invalid user user from 14.56.180.103 port 42758
Sep 24 13:27:12 activeserver sshd[16123]: Failed password for invalid user user from 14.56.180.103 port 42758 ssh2
Sep 24 13:30:36 activeserver sshd[27240]: Invalid user test from 14.56.180.103 port 33196
2020-09-25 08:34:05
195.54.160.180 attack
Sep 25 01:14:13 mavik sshd[23286]: Failed password for invalid user admin from 195.54.160.180 port 43017 ssh2
Sep 25 01:14:13 mavik sshd[23288]: Invalid user admin from 195.54.160.180
Sep 25 01:14:13 mavik sshd[23288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.54.160.180
Sep 25 01:14:15 mavik sshd[23288]: Failed password for invalid user admin from 195.54.160.180 port 48785 ssh2
Sep 25 01:14:16 mavik sshd[23291]: Invalid user admin from 195.54.160.180
...
2020-09-25 08:21:59
117.247.238.10 attackspambots
Sep 25 00:04:05 MainVPS sshd[4240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.247.238.10  user=root
Sep 25 00:04:07 MainVPS sshd[4240]: Failed password for root from 117.247.238.10 port 36297 ssh2
Sep 25 00:09:16 MainVPS sshd[16175]: Invalid user admin from 117.247.238.10 port 33781
Sep 25 00:09:16 MainVPS sshd[16175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.247.238.10
Sep 25 00:09:16 MainVPS sshd[16175]: Invalid user admin from 117.247.238.10 port 33781
Sep 25 00:09:18 MainVPS sshd[16175]: Failed password for invalid user admin from 117.247.238.10 port 33781 ssh2
...
2020-09-25 08:19:17
13.82.219.14 attack
2020-09-25T00:31:33.128452abusebot-2.cloudsearch.cf sshd[25044]: Invalid user huconn from 13.82.219.14 port 45287
2020-09-25T00:31:33.134709abusebot-2.cloudsearch.cf sshd[25044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.82.219.14
2020-09-25T00:31:33.128452abusebot-2.cloudsearch.cf sshd[25044]: Invalid user huconn from 13.82.219.14 port 45287
2020-09-25T00:31:34.994361abusebot-2.cloudsearch.cf sshd[25044]: Failed password for invalid user huconn from 13.82.219.14 port 45287 ssh2
2020-09-25T00:40:28.858154abusebot-2.cloudsearch.cf sshd[25170]: Invalid user bptrans from 13.82.219.14 port 7043
2020-09-25T00:40:28.865896abusebot-2.cloudsearch.cf sshd[25170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.82.219.14
2020-09-25T00:40:28.858154abusebot-2.cloudsearch.cf sshd[25170]: Invalid user bptrans from 13.82.219.14 port 7043
2020-09-25T00:40:30.169377abusebot-2.cloudsearch.cf sshd[25170]: Failed p
...
2020-09-25 08:43:03

Recently Reported IPs

182.59.125.68 185.248.140.152 74.115.140.145 84.47.149.208
189.209.251.73 60.7.208.157 36.90.18.249 185.9.84.54
183.220.188.187 115.213.254.206 176.46.148.72 212.60.20.140
87.203.206.135 85.209.150.160 193.233.138.238 182.232.228.20
14.187.49.39 103.199.157.113 191.14.225.130 112.94.96.200