Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Egypt

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.69.138.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40222
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.69.138.4.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025010602 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 07 06:29:13 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 4.138.69.41.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 4.138.69.41.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
81.229.248.115 attack
Jun 30 15:20:45 server2 sshd\[29894\]: Invalid user admin from 81.229.248.115
Jun 30 15:20:45 server2 sshd\[29896\]: User root from 81-229-248-115-no94.tbcn.telia.com not allowed because not listed in AllowUsers
Jun 30 15:20:46 server2 sshd\[29898\]: Invalid user admin from 81.229.248.115
Jun 30 15:20:46 server2 sshd\[29900\]: Invalid user admin from 81.229.248.115
Jun 30 15:20:46 server2 sshd\[29902\]: Invalid user admin from 81.229.248.115
Jun 30 15:20:47 server2 sshd\[29904\]: User apache from 81-229-248-115-no94.tbcn.telia.com not allowed because not listed in AllowUsers
2020-07-01 01:48:05
89.248.174.3 attackspam
firewall-block, port(s): 591/tcp
2020-07-01 02:18:13
185.143.73.103 attackspambots
2020-06-30 16:10:38 auth_plain authenticator failed for (User) [185.143.73.103]: 535 Incorrect authentication data (set_id=Projector-Accessories@csmailer.org)
2020-06-30 16:11:29 auth_plain authenticator failed for (User) [185.143.73.103]: 535 Incorrect authentication data (set_id=pktfilter@csmailer.org)
2020-06-30 16:12:14 auth_plain authenticator failed for (User) [185.143.73.103]: 535 Incorrect authentication data (set_id=personal_technology@csmailer.org)
2020-06-30 16:13:10 auth_plain authenticator failed for (User) [185.143.73.103]: 535 Incorrect authentication data (set_id=pc-monitoring@csmailer.org)
2020-06-30 16:13:57 auth_plain authenticator failed for (User) [185.143.73.103]: 535 Incorrect authentication data (set_id=Outlaw@csmailer.org)
...
2020-07-01 01:59:03
106.13.41.250 attackspam
2020-06-30T15:35:43.680917mail.broermann.family sshd[12311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.41.250
2020-06-30T15:35:43.676279mail.broermann.family sshd[12311]: Invalid user ranjit from 106.13.41.250 port 42956
2020-06-30T15:35:45.628377mail.broermann.family sshd[12311]: Failed password for invalid user ranjit from 106.13.41.250 port 42956 ssh2
2020-06-30T15:39:24.283278mail.broermann.family sshd[12605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.41.250  user=root
2020-06-30T15:39:26.571854mail.broermann.family sshd[12605]: Failed password for root from 106.13.41.250 port 59246 ssh2
...
2020-07-01 01:46:06
179.188.7.93 attackbots
From bounce-35cd4d53be0cb40ec1d4b79cbb1257a1@smtplw-13.com Tue Jun 30 09:20:47 2020
Received: from smtp145t7f93.saaspmta0001.correio.biz ([179.188.7.93]:35053)
2020-07-01 01:45:23
139.99.66.210 attack
Port Scan detected!
...
2020-07-01 01:39:28
13.78.230.118 attackspambots
" "
2020-07-01 01:53:44
59.125.6.34 attackspambots
firewall-block, port(s): 445/tcp
2020-07-01 01:40:46
119.29.154.221 attackbotsspam
Jun 30 14:20:50 raspberrypi sshd[10783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.154.221  user=root
Jun 30 14:20:52 raspberrypi sshd[10783]: Failed password for invalid user root from 119.29.154.221 port 46888 ssh2
...
2020-07-01 01:36:46
113.161.224.67 attackbots
IP 113.161.224.67 attacked honeypot on port: 1433 at 6/30/2020 5:20:26 AM
2020-07-01 01:56:15
184.105.139.121 attack
Honeypot hit.
2020-07-01 02:13:55
2.133.67.185 attackbots
Email rejected due to spam filtering
2020-07-01 01:46:33
46.38.148.10 attack
2020-06-30 16:23:22 auth_plain authenticator failed for (User) [46.38.148.10]: 535 Incorrect authentication data (set_id=group@csmailer.org)
2020-06-30 16:23:53 auth_plain authenticator failed for (User) [46.38.148.10]: 535 Incorrect authentication data (set_id=help@csmailer.org)
2020-06-30 16:24:23 auth_plain authenticator failed for (User) [46.38.148.10]: 535 Incorrect authentication data (set_id=helpdesk@csmailer.org)
2020-06-30 16:24:52 auth_plain authenticator failed for (User) [46.38.148.10]: 535 Incorrect authentication data (set_id=host@csmailer.org)
2020-06-30 16:25:18 auth_plain authenticator failed for (User) [46.38.148.10]: 535 Incorrect authentication data (set_id=hosting@csmailer.org)
...
2020-07-01 02:04:55
103.43.152.121 attackbotsspam
Invalid user user2 from 103.43.152.121 port 36268
2020-07-01 02:06:33
139.59.43.196 attackbotsspam
[Sun Jun 28 04:22:55.455453 2020] [:error] [pid 206739:tid 140495158245120] [client 139.59.43.196:44940] [client 139.59.43.196] ModSecurity: Access denied with code 403 (phase 2). detected XSS using libinjection. [file "/usr/share/modsecurity-crs/rules/REQUEST-941-APPLICATION-ATTACK-XSS.conf"] [line "59"] [id "941100"] [msg "XSS Attack Detected via libinjection"] [data "Matched Data: XSS data found within ARGS_NAMES:
2020-07-01 01:42:45

Recently Reported IPs

77.227.229.233 51.11.12.36 50.193.103.182 34.105.26.104
51.119.186.227 152.78.86.50 185.192.200.192 253.77.50.113
193.15.229.134 245.176.199.191 254.123.255.240 126.169.153.176
12.4.137.140 13.184.93.22 150.180.41.246 169.109.253.210
25.216.129.232 78.26.246.64 12.254.129.48 118.198.207.168