Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Madrid

Region: Comunidad de Madrid

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.138.53.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33113
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.138.53.89.			IN	A

;; AUTHORITY SECTION:
.			275	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060100 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 02 01:10:25 CST 2024
;; MSG SIZE  rcvd: 104
Host info
89.53.138.2.in-addr.arpa domain name pointer 89.red-2-138-53.dynamicip.rima-tde.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
89.53.138.2.in-addr.arpa	name = 89.red-2-138-53.dynamicip.rima-tde.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
1.64.224.86 attack
Honeypot attack, port: 23, PTR: 1-64-224-086.static.netvigator.com.
2019-07-30 03:11:22
14.169.223.234 attackbotsspam
Jul 29 19:33:25 shared04 sshd[1115]: Invalid user admin from 14.169.223.234
Jul 29 19:33:25 shared04 sshd[1115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.169.223.234
Jul 29 19:33:28 shared04 sshd[1115]: Failed password for invalid user admin from 14.169.223.234 port 56568 ssh2
Jul 29 19:33:29 shared04 sshd[1115]: Connection closed by 14.169.223.234 port 56568 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.169.223.234
2019-07-30 03:25:16
51.77.148.57 attack
Jul 29 21:49:34 server sshd\[14473\]: Invalid user lionel from 51.77.148.57 port 41282
Jul 29 21:49:34 server sshd\[14473\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.148.57
Jul 29 21:49:35 server sshd\[14473\]: Failed password for invalid user lionel from 51.77.148.57 port 41282 ssh2
Jul 29 21:53:48 server sshd\[9196\]: Invalid user @wsx from 51.77.148.57 port 36018
Jul 29 21:53:48 server sshd\[9196\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.148.57
2019-07-30 02:59:51
112.202.16.56 attackbots
Jul 25 21:24:52 vpxxxxxxx22308 sshd[12774]: Invalid user ubnt from 112.202.16.56
Jul 25 21:24:59 vpxxxxxxx22308 sshd[12774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.202.16.56
Jul 25 21:25:00 vpxxxxxxx22308 sshd[12777]: Invalid user ubnt from 112.202.16.56
Jul 25 21:25:01 vpxxxxxxx22308 sshd[12774]: Failed password for invalid user ubnt from 112.202.16.56 port 58252 ssh2
Jul 25 21:25:04 vpxxxxxxx22308 sshd[12777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.202.16.56
Jul 25 21:25:05 vpxxxxxxx22308 sshd[12777]: Failed password for invalid user ubnt from 112.202.16.56 port 59612 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=112.202.16.56
2019-07-30 02:43:59
120.27.100.100 attackspam
Automatic report - Banned IP Access
2019-07-30 03:03:03
162.243.46.161 attackspambots
Jul 29 20:45:59 bouncer sshd\[3972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.46.161  user=root
Jul 29 20:46:01 bouncer sshd\[3972\]: Failed password for root from 162.243.46.161 port 48392 ssh2
Jul 29 20:50:34 bouncer sshd\[3979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.46.161  user=root
...
2019-07-30 02:58:12
51.254.51.182 attack
SSH Bruteforce Attack
2019-07-30 02:50:41
165.22.218.51 attack
SSH/22 MH Probe, BF, Hack -
2019-07-30 03:12:43
185.176.26.14 attackspambots
Honeypot attack, port: 5555, PTR: PTR record not found
2019-07-30 02:43:21
107.170.201.223 attackspam
29.07.2019 17:43:20 Connection to port 81 blocked by firewall
2019-07-30 03:13:08
185.234.219.57 attack
Jul 29 20:20:42 relay postfix/smtpd\[18667\]: warning: unknown\[185.234.219.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 29 20:22:50 relay postfix/smtpd\[27545\]: warning: unknown\[185.234.219.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 29 20:24:56 relay postfix/smtpd\[27545\]: warning: unknown\[185.234.219.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 29 20:27:08 relay postfix/smtpd\[12682\]: warning: unknown\[185.234.219.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 29 20:29:17 relay postfix/smtpd\[12682\]: warning: unknown\[185.234.219.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-07-30 02:51:55
134.209.156.171 attackspambots
Jul 29 18:24:51 *** sshd[19531]: Invalid user oracle from 134.209.156.171
2019-07-30 02:42:33
35.189.235.245 attackbots
POP3
2019-07-30 02:40:37
69.175.97.170 attack
Honeypot attack, port: 23, PTR: sh-chi-us-gp1-wk102.internet-census.org.
2019-07-30 02:42:16
198.245.60.56 attackspam
Jul 29 20:22:12 SilenceServices sshd[6845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.60.56
Jul 29 20:22:14 SilenceServices sshd[6845]: Failed password for invalid user panjun24 from 198.245.60.56 port 38230 ssh2
Jul 29 20:26:22 SilenceServices sshd[9992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.60.56
2019-07-30 02:42:00

Recently Reported IPs

2.138.33.100 2.131.65.110 151.219.129.124 2.138.26.115
99.154.149.24 2.138.37.174 2.171.103.116 29.177.123.150
64.46.58.87 2.138.28.204 3.248.137.144 2.182.153.19
2.189.59.6 2.194.228.240 2.196.207.153 38.146.51.164
25.183.242.6 2.138.254.0 4.221.79.220 2.139.187.83