Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: Telekom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.166.140.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3178
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.166.140.138.			IN	A

;; AUTHORITY SECTION:
.			334	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024092400 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Sep 24 20:22:53 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 138.140.166.2.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.140.166.2.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.89.177.46 attackspambots
<6 unauthorized SSH connections
2020-03-19 17:39:13
213.160.143.146 attack
2020-03-19T06:09:16.126615abusebot-6.cloudsearch.cf sshd[21361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=gate.metro.kiev.ua  user=root
2020-03-19T06:09:18.192832abusebot-6.cloudsearch.cf sshd[21361]: Failed password for root from 213.160.143.146 port 33569 ssh2
2020-03-19T06:13:48.279749abusebot-6.cloudsearch.cf sshd[21589]: Invalid user ajay from 213.160.143.146 port 19431
2020-03-19T06:13:48.295187abusebot-6.cloudsearch.cf sshd[21589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=gate.metro.kiev.ua
2020-03-19T06:13:48.279749abusebot-6.cloudsearch.cf sshd[21589]: Invalid user ajay from 213.160.143.146 port 19431
2020-03-19T06:13:50.364681abusebot-6.cloudsearch.cf sshd[21589]: Failed password for invalid user ajay from 213.160.143.146 port 19431 ssh2
2020-03-19T06:18:21.754046abusebot-6.cloudsearch.cf sshd[21820]: Invalid user gaochangfeng from 213.160.143.146 port 49766
...
2020-03-19 17:08:28
141.98.80.148 attackbots
2020-03-19 04:16:40 dovecot_plain authenticator failed for ([141.98.80.148]) [141.98.80.148]:46802 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=nonlinear@lerctr.org)
2020-03-19 04:16:40 dovecot_plain authenticator failed for ([141.98.80.148]) [141.98.80.148]:41492 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=noobb@lerctr.org)
2020-03-19 04:16:40 dovecot_plain authenticator failed for ([141.98.80.148]) [141.98.80.148]:46738 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=nonlinear1@lerctr.org)
...
2020-03-19 17:29:29
36.46.142.80 attackspam
Mar 19 05:25:01 [host] sshd[29703]: pam_unix(sshd:
Mar 19 05:25:03 [host] sshd[29703]: Failed passwor
Mar 19 05:27:32 [host] sshd[29796]: Invalid user l
2020-03-19 17:49:24
188.128.39.127 attack
Mar 19 10:08:06 vmd48417 sshd[19405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.128.39.127
2020-03-19 17:18:06
45.148.10.95 attackspambots
DATE:2020-03-19 09:28:53, IP:45.148.10.95, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-03-19 17:22:32
203.192.204.168 attackbotsspam
Invalid user qq from 203.192.204.168 port 34984
2020-03-19 17:27:32
104.131.46.166 attackspambots
Invalid user alice from 104.131.46.166 port 58234
2020-03-19 17:00:46
134.175.161.251 attack
k+ssh-bruteforce
2020-03-19 17:31:39
45.125.65.35 attackbots
Mar 19 10:13:46 srv01 postfix/smtpd[15972]: warning: unknown[45.125.65.35]: SASL LOGIN authentication failed: authentication failure
Mar 19 10:14:10 srv01 postfix/smtpd[15972]: warning: unknown[45.125.65.35]: SASL LOGIN authentication failed: authentication failure
Mar 19 10:23:20 srv01 postfix/smtpd[16491]: warning: unknown[45.125.65.35]: SASL LOGIN authentication failed: authentication failure
...
2020-03-19 17:26:59
182.61.21.155 attackspambots
2020-03-18 UTC: (29x) - bf1942server,cpaneleximscanner,ftp,master,panyongjia,root(21x),sys,test,xrdp
2020-03-19 17:47:52
106.52.79.201 attackspambots
Mar 19 09:55:09 server sshd\[2571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.79.201  user=root
Mar 19 09:55:11 server sshd\[2571\]: Failed password for root from 106.52.79.201 port 33786 ssh2
Mar 19 10:14:30 server sshd\[7791\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.79.201  user=root
Mar 19 10:14:32 server sshd\[7791\]: Failed password for root from 106.52.79.201 port 49632 ssh2
Mar 19 10:20:43 server sshd\[9900\]: Invalid user as from 106.52.79.201
Mar 19 10:20:43 server sshd\[9900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.79.201 
...
2020-03-19 17:00:18
222.186.30.218 attackbotsspam
Mar 19 10:16:55 dcd-gentoo sshd[32550]: User root from 222.186.30.218 not allowed because none of user's groups are listed in AllowGroups
Mar 19 10:16:57 dcd-gentoo sshd[32550]: error: PAM: Authentication failure for illegal user root from 222.186.30.218
Mar 19 10:16:55 dcd-gentoo sshd[32550]: User root from 222.186.30.218 not allowed because none of user's groups are listed in AllowGroups
Mar 19 10:16:57 dcd-gentoo sshd[32550]: error: PAM: Authentication failure for illegal user root from 222.186.30.218
Mar 19 10:16:55 dcd-gentoo sshd[32550]: User root from 222.186.30.218 not allowed because none of user's groups are listed in AllowGroups
Mar 19 10:16:57 dcd-gentoo sshd[32550]: error: PAM: Authentication failure for illegal user root from 222.186.30.218
Mar 19 10:16:57 dcd-gentoo sshd[32550]: Failed keyboard-interactive/pam for invalid user root from 222.186.30.218 port 20379 ssh2
...
2020-03-19 17:20:24
183.251.103.233 attackbots
Invalid user michael from 183.251.103.233 port 55023
2020-03-19 17:46:36
178.171.122.237 attackbotsspam
Chat Spam
2020-03-19 17:24:05

Recently Reported IPs

157.116.161.10 61.233.40.117 253.109.117.72 50.219.0.225
67.179.142.168 134.249.101.64 52.17.115.184 148.26.233.219
85.59.57.118 241.32.150.36 77.203.132.80 200.27.210.228
51.151.171.125 242.140.21.6 137.138.203.198 86.215.110.19
14.77.159.145 49.124.54.111 135.164.212.70 229.222.215.227