Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
222.138.219.217 attack
DATE:2020-10-05 22:36:30, IP:222.138.219.217, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-10-07 01:33:33
222.138.219.217 attackbotsspam
DATE:2020-10-05 22:36:30, IP:222.138.219.217, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-10-06 17:26:35
222.138.213.132 attackbotsspam
Attempted connection to port 8080.
2020-06-13 03:41:01
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 222.138.21.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56225
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;222.138.21.50.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 03:12:14 CST 2022
;; MSG SIZE  rcvd: 106
Host info
50.21.138.222.in-addr.arpa domain name pointer hn.kd.ny.adsl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
50.21.138.222.in-addr.arpa	name = hn.kd.ny.adsl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
201.93.4.77 attack
Scanning random ports - tries to find possible vulnerable services
2020-03-02 07:17:13
203.81.71.240 attack
Scanning random ports - tries to find possible vulnerable services
2020-03-02 07:02:52
202.177.148.198 attackspambots
Scanning random ports - tries to find possible vulnerable services
2020-03-02 07:03:32
202.67.39.17 attackspam
Scanning random ports - tries to find possible vulnerable services
2020-03-02 07:06:05
203.130.240.98 attack
Scanning random ports - tries to find possible vulnerable services
2020-03-02 07:01:03
201.149.57.154 attackbots
Unauthorized connection attempt from IP address 201.149.57.154 on Port 445(SMB)
2020-03-02 07:12:00
209.45.67.228 attackspambots
Scanning random ports - tries to find possible vulnerable services
2020-03-02 06:56:27
201.68.161.118 attackbots
Scanning random ports - tries to find possible vulnerable services
2020-03-02 07:17:46
200.240.238.170 attackspam
Scanning random ports - tries to find possible vulnerable services
2020-03-02 07:19:58
200.77.161.61 attack
Scanning random ports - tries to find possible vulnerable services
2020-03-02 07:26:22
200.169.12.246 attackbotsspam
Scanning random ports - tries to find possible vulnerable services
2020-03-02 07:22:06
198.204.252.106 attackspam
ssh brute force
2020-03-02 07:29:30
201.111.70.87 attack
Scanning random ports - tries to find possible vulnerable services
2020-03-02 07:14:23
209.17.97.10 attack
Scanning random ports - tries to find possible vulnerable services
2020-03-02 06:57:21
201.150.109.255 attack
Unauthorized connection attempt detected from IP address 201.150.109.255 to port 26 [J]
2020-03-02 07:11:35

Recently Reported IPs

200.137.134.131 223.233.67.37 60.168.206.243 1.85.52.250
183.128.176.190 124.132.84.103 176.120.32.167 5.251.51.94
2.187.182.15 2.134.139.42 1.117.93.3 45.231.154.240
101.85.217.68 103.84.190.66 49.228.151.148 88.150.241.126
197.37.200.207 1.36.153.147 213.179.229.93 193.198.170.165