Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 241.138.228.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26870
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;241.138.228.69.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 00:30:14 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 69.228.138.241.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 69.228.138.241.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
197.185.105.184 attack
Brute Force
2020-09-04 05:00:25
222.186.175.202 attackbotsspam
Failed password for invalid user from 222.186.175.202 port 44342 ssh2
2020-09-04 05:01:02
125.212.203.113 attack
Sep  1 10:25:57 Ubuntu-1404-trusty-64-minimal sshd\[3408\]: Invalid user test from 125.212.203.113
Sep  1 10:25:57 Ubuntu-1404-trusty-64-minimal sshd\[3408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.203.113
Sep  1 10:25:59 Ubuntu-1404-trusty-64-minimal sshd\[3408\]: Failed password for invalid user test from 125.212.203.113 port 40742 ssh2
Sep  3 22:08:23 Ubuntu-1404-trusty-64-minimal sshd\[6942\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.203.113  user=root
Sep  3 22:08:25 Ubuntu-1404-trusty-64-minimal sshd\[6942\]: Failed password for root from 125.212.203.113 port 57428 ssh2
2020-09-04 04:55:59
195.54.160.180 attackbots
Sep  3 16:33:39 ny01 sshd[27617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.54.160.180
Sep  3 16:33:41 ny01 sshd[27617]: Failed password for invalid user admin from 195.54.160.180 port 35604 ssh2
Sep  3 16:33:42 ny01 sshd[27623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.54.160.180
2020-09-04 04:36:14
5.188.84.115 attackbots
fell into ViewStateTrap:wien2018
2020-09-04 05:07:27
54.36.148.79 attackbots
/dev
2020-09-04 05:07:50
61.177.172.54 attackspambots
Sep  3 22:42:59 kh-dev-server sshd[5742]: Failed password for root from 61.177.172.54 port 14670 ssh2
...
2020-09-04 04:46:59
222.186.42.155 attackbots
Sep  3 23:11:26 dev0-dcde-rnet sshd[20904]: Failed password for root from 222.186.42.155 port 18774 ssh2
Sep  3 23:11:34 dev0-dcde-rnet sshd[20906]: Failed password for root from 222.186.42.155 port 49117 ssh2
2020-09-04 05:12:19
49.235.69.80 attackspambots
SSH
2020-09-04 04:55:22
222.186.175.216 attackbots
Sep  3 22:35:50 nopemail auth.info sshd[20036]: Unable to negotiate with 222.186.175.216 port 14478: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth]
...
2020-09-04 04:37:29
54.37.86.192 attackspam
Sep  3 20:06:23 django-0 sshd[7862]: Invalid user oracle from 54.37.86.192
...
2020-09-04 05:00:47
202.153.37.195 attackbotsspam
Sep  3 15:21:47 NPSTNNYC01T sshd[11577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.153.37.195
Sep  3 15:21:49 NPSTNNYC01T sshd[11577]: Failed password for invalid user nicole from 202.153.37.195 port 42744 ssh2
Sep  3 15:24:08 NPSTNNYC01T sshd[11725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.153.37.195
...
2020-09-04 04:47:41
128.199.92.187 attackbotsspam
Invalid user sdi from 128.199.92.187 port 33094
2020-09-04 05:04:26
36.89.213.100 attack
Banned for a week because repeated abuses, for example SSH, but not only
2020-09-04 04:58:26
112.85.42.67 attackbotsspam
Sep  3 16:51:11 plusreed sshd[13492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.67  user=root
Sep  3 16:51:13 plusreed sshd[13492]: Failed password for root from 112.85.42.67 port 50976 ssh2
...
2020-09-04 05:04:09

Recently Reported IPs

98.154.56.52 56.128.61.130 239.120.194.21 170.177.238.221
226.99.22.236 132.163.134.210 221.8.232.5 24.222.230.165
177.149.152.93 170.26.99.206 13.111.182.110 9.233.25.139
137.205.204.185 127.93.138.46 146.217.9.82 54.33.107.177
136.147.87.175 66.225.180.129 98.132.63.237 27.145.28.229