Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.138.0.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12476
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;202.138.0.21.			IN	A

;; AUTHORITY SECTION:
.			569	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 23:57:06 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 21.0.138.202.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.0.138.202.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
1.36.85.246 attackbotsspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-18 02:34:30
116.49.215.189 attackspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-18 02:25:08
222.186.175.148 attack
Sep 17 20:29:19 marvibiene sshd[31047]: Failed password for root from 222.186.175.148 port 8772 ssh2
Sep 17 20:29:24 marvibiene sshd[31047]: Failed password for root from 222.186.175.148 port 8772 ssh2
2020-09-18 02:32:33
165.22.101.1 attackspam
2020-09-17T11:22:18.546560devel sshd[29587]: Invalid user techsupport from 165.22.101.1 port 59134
2020-09-17T11:22:20.542916devel sshd[29587]: Failed password for invalid user techsupport from 165.22.101.1 port 59134 ssh2
2020-09-17T11:39:30.266919devel sshd[32305]: Invalid user omsagent from 165.22.101.1 port 59056
2020-09-18 01:57:54
45.84.196.165 attack
Unauthorised access (Sep 17) SRC=45.84.196.165 LEN=40 TOS=0x10 PREC=0x40 TTL=56 ID=27140 TCP DPT=8080 WINDOW=23915 SYN
2020-09-18 02:14:44
201.149.13.58 attackbots
SSH Bruteforce attack
2020-09-18 02:27:29
66.248.205.175 attackbotsspam
spam
2020-09-18 02:20:09
31.8.75.28 attackspambots
Unauthorized connection attempt from IP address 31.8.75.28 on Port 445(SMB)
2020-09-18 02:34:10
80.113.12.34 attackspam
Sep 17 13:02:04 bilbo sshd[22693]: Invalid user admin from 80.113.12.34
Sep 17 13:02:15 bilbo sshd[22738]: User root from ip-80-113-12-34.ip.prioritytelecom.net not allowed because not listed in AllowUsers
Sep 17 13:02:24 bilbo sshd[22740]: Invalid user admin from 80.113.12.34
Sep 17 13:02:34 bilbo sshd[22742]: Invalid user admin from 80.113.12.34
...
2020-09-18 02:16:57
168.0.148.174 attackbotsspam
Unauthorized connection attempt from IP address 168.0.148.174 on Port 445(SMB)
2020-09-18 02:19:41
94.102.54.199 attackbots
Sep 17 18:23:52 h1655903 dovecot: pop3-login: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=94.102.54.199, lip=85.214.28.7, session=\
Sep 17 18:58:09 h1655903 dovecot: pop3-login: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=94.102.54.199, lip=85.214.28.7, session=\
Sep 17 19:32:17 h1655903 dovecot: pop3-login: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=94.102.54.199, lip=85.214.28.7, session=\
...
2020-09-18 01:52:21
201.44.241.178 attackbots
Unauthorized connection attempt from IP address 201.44.241.178 on Port 445(SMB)
2020-09-18 02:43:16
108.188.39.148 attack
Unauthorized connection attempt from IP address 108.188.39.148 on Port 445(SMB)
2020-09-18 02:33:20
51.68.172.217 attack
Sep 17 20:11:29 OPSO sshd\[28461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.172.217  user=root
Sep 17 20:11:31 OPSO sshd\[28461\]: Failed password for root from 51.68.172.217 port 38174 ssh2
Sep 17 20:16:17 OPSO sshd\[29590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.172.217  user=root
Sep 17 20:16:19 OPSO sshd\[29590\]: Failed password for root from 51.68.172.217 port 49440 ssh2
Sep 17 20:21:00 OPSO sshd\[30495\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.172.217  user=root
2020-09-18 02:35:47
94.74.185.236 attack
Sep 16 18:06:14 mail.srvfarm.net postfix/smtps/smtpd[3598103]: warning: unknown[94.74.185.236]: SASL PLAIN authentication failed: 
Sep 16 18:06:15 mail.srvfarm.net postfix/smtps/smtpd[3598103]: lost connection after AUTH from unknown[94.74.185.236]
Sep 16 18:08:26 mail.srvfarm.net postfix/smtpd[3597749]: warning: unknown[94.74.185.236]: SASL PLAIN authentication failed: 
Sep 16 18:08:26 mail.srvfarm.net postfix/smtpd[3597749]: lost connection after AUTH from unknown[94.74.185.236]
Sep 16 18:14:28 mail.srvfarm.net postfix/smtps/smtpd[3584298]: warning: unknown[94.74.185.236]: SASL PLAIN authentication failed:
2020-09-18 01:53:04

Recently Reported IPs

202.137.236.15 202.137.213.75 202.138.49.32 202.138.250.49
202.138.250.45 202.139.199.68 202.139.203.231 202.139.208.3
144.217.110.43 202.14.122.124 202.139.192.137 202.14.122.128
202.138.248.229 202.139.192.208 202.14.122.157 202.14.122.155
202.139.215.43 202.14.122.18 202.14.122.110 202.14.122.169