Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Madrid

Region: Comunidad de Madrid

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.138.53.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33113
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.138.53.89.			IN	A

;; AUTHORITY SECTION:
.			275	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060100 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 02 01:10:25 CST 2024
;; MSG SIZE  rcvd: 104
Host info
89.53.138.2.in-addr.arpa domain name pointer 89.red-2-138-53.dynamicip.rima-tde.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
89.53.138.2.in-addr.arpa	name = 89.red-2-138-53.dynamicip.rima-tde.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
59.188.72.137 attackspambots
" "
2020-05-11 14:40:35
172.104.77.187 attackspam
Connection by 172.104.77.187 on port: 2121 got caught by honeypot at 5/11/2020 4:53:48 AM
2020-05-11 14:40:06
103.79.90.72 attack
srv02 SSH BruteForce Attacks 22 ..
2020-05-11 15:10:45
45.143.220.18 attackbotsspam
[2020-05-11 02:59:28] NOTICE[1157] chan_sip.c: Registration from '"900" ' failed for '45.143.220.18:5092' - Wrong password
[2020-05-11 02:59:28] SECURITY[1173] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-05-11T02:59:28.474-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="900",SessionID="0x7f5f10905838",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.220.18/5092",Challenge="78eef63b",ReceivedChallenge="78eef63b",ReceivedHash="7eb8ea24252d61007d23d80259c61a3b"
[2020-05-11 02:59:28] NOTICE[1157] chan_sip.c: Registration from '"900" ' failed for '45.143.220.18:5092' - Wrong password
[2020-05-11 02:59:28] SECURITY[1173] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-05-11T02:59:28.587-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="900",SessionID="0x7f5f103ba5e8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.2
...
2020-05-11 15:13:18
59.42.86.207 attackbotsspam
May 11 05:54:00 cloud sshd[26079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.42.86.207 
May 11 05:54:02 cloud sshd[26079]: Failed password for invalid user user1 from 59.42.86.207 port 39670 ssh2
2020-05-11 14:34:05
46.101.33.198 attackbots
May 11 05:45:35 rotator sshd\[28193\]: Invalid user bx from 46.101.33.198May 11 05:45:37 rotator sshd\[28193\]: Failed password for invalid user bx from 46.101.33.198 port 48100 ssh2May 11 05:49:34 rotator sshd\[28239\]: Invalid user admin from 46.101.33.198May 11 05:49:36 rotator sshd\[28239\]: Failed password for invalid user admin from 46.101.33.198 port 58776 ssh2May 11 05:53:38 rotator sshd\[29032\]: Invalid user lan from 46.101.33.198May 11 05:53:40 rotator sshd\[29032\]: Failed password for invalid user lan from 46.101.33.198 port 41220 ssh2
...
2020-05-11 14:50:30
129.226.53.203 attackspam
May 11 13:55:07 itv-usvr-01 sshd[5738]: Invalid user fwmenual from 129.226.53.203
May 11 13:55:07 itv-usvr-01 sshd[5738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.53.203
May 11 13:55:07 itv-usvr-01 sshd[5738]: Invalid user fwmenual from 129.226.53.203
May 11 13:55:09 itv-usvr-01 sshd[5738]: Failed password for invalid user fwmenual from 129.226.53.203 port 52124 ssh2
May 11 14:01:14 itv-usvr-01 sshd[5955]: Invalid user deploy from 129.226.53.203
2020-05-11 15:10:05
92.38.236.62 attackspambots
[portscan] Port scan
2020-05-11 14:57:38
106.54.141.45 attackspambots
May 11 07:47:51 Ubuntu-1404-trusty-64-minimal sshd\[5060\]: Invalid user junit from 106.54.141.45
May 11 07:47:51 Ubuntu-1404-trusty-64-minimal sshd\[5060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.141.45
May 11 07:47:53 Ubuntu-1404-trusty-64-minimal sshd\[5060\]: Failed password for invalid user junit from 106.54.141.45 port 41776 ssh2
May 11 07:57:06 Ubuntu-1404-trusty-64-minimal sshd\[9473\]: Invalid user user from 106.54.141.45
May 11 07:57:06 Ubuntu-1404-trusty-64-minimal sshd\[9473\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.141.45
2020-05-11 14:59:12
43.226.147.219 attack
2020-05-11T04:22:12.756249shield sshd\[28204\]: Invalid user klaudia from 43.226.147.219 port 53706
2020-05-11T04:22:12.760151shield sshd\[28204\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.147.219
2020-05-11T04:22:14.658524shield sshd\[28204\]: Failed password for invalid user klaudia from 43.226.147.219 port 53706 ssh2
2020-05-11T04:25:58.160622shield sshd\[28835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.147.219  user=root
2020-05-11T04:26:00.420358shield sshd\[28835\]: Failed password for root from 43.226.147.219 port 39292 ssh2
2020-05-11 14:41:08
165.22.54.171 attackbotsspam
May 11 08:14:45 mout sshd[2279]: Invalid user zq from 165.22.54.171 port 59950
2020-05-11 15:03:01
45.249.92.62 attack
May 11 08:03:26 ns382633 sshd\[1050\]: Invalid user videolan from 45.249.92.62 port 45511
May 11 08:03:26 ns382633 sshd\[1050\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.249.92.62
May 11 08:03:28 ns382633 sshd\[1050\]: Failed password for invalid user videolan from 45.249.92.62 port 45511 ssh2
May 11 08:11:52 ns382633 sshd\[2803\]: Invalid user wialon from 45.249.92.62 port 47092
May 11 08:11:52 ns382633 sshd\[2803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.249.92.62
2020-05-11 14:54:42
106.12.106.232 attack
2020-05-11T09:01:54.494043centos sshd[29308]: Failed password for invalid user gg from 106.12.106.232 port 56922 ssh2
2020-05-11T09:04:03.338147centos sshd[29427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.106.232  user=root
2020-05-11T09:04:05.054913centos sshd[29427]: Failed password for root from 106.12.106.232 port 46010 ssh2
...
2020-05-11 15:12:23
27.115.62.134 attackbots
Too many connections or unauthorized access detected from Arctic banned ip
2020-05-11 14:41:26
185.176.27.54 attack
05/11/2020-01:42:31.715732 185.176.27.54 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-11 14:47:38

Recently Reported IPs

2.138.33.100 2.131.65.110 151.219.129.124 2.138.26.115
99.154.149.24 2.138.37.174 2.171.103.116 29.177.123.150
64.46.58.87 2.138.28.204 3.248.137.144 2.182.153.19
2.189.59.6 2.194.228.240 2.196.207.153 38.146.51.164
25.183.242.6 2.138.254.0 4.221.79.220 2.139.187.83