Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Syrian Arab Republic (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 46.213.225.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43942
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;46.213.225.138.			IN	A

;; AUTHORITY SECTION:
.			28	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 13:15:18 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 138.225.213.46.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.225.213.46.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
151.80.254.78 attack
Nov  8 23:18:26 root sshd[19518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.254.78 
Nov  8 23:18:28 root sshd[19518]: Failed password for invalid user derry from 151.80.254.78 port 45110 ssh2
Nov  8 23:36:21 root sshd[19678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.254.78 
...
2019-11-09 06:58:35
109.248.203.131 attackbotsspam
Nov  9 00:06:25 vps691689 sshd[20217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.248.203.131
Nov  9 00:06:28 vps691689 sshd[20217]: Failed password for invalid user wta from 109.248.203.131 port 41189 ssh2
...
2019-11-09 07:19:57
49.247.203.22 attackspambots
Nov  8 22:48:09 venus sshd\[24052\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.203.22  user=root
Nov  8 22:48:12 venus sshd\[24052\]: Failed password for root from 49.247.203.22 port 57636 ssh2
Nov  8 22:52:13 venus sshd\[24089\]: Invalid user sysadmin from 49.247.203.22 port 39002
...
2019-11-09 07:08:00
80.110.34.113 attackbots
Automatic report - Banned IP Access
2019-11-09 07:19:31
164.132.145.70 attackbots
Nov  8 23:32:22 fr01 sshd[18142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.145.70  user=root
Nov  8 23:32:24 fr01 sshd[18142]: Failed password for root from 164.132.145.70 port 47914 ssh2
Nov  8 23:35:53 fr01 sshd[18766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.145.70  user=root
Nov  8 23:35:55 fr01 sshd[18766]: Failed password for root from 164.132.145.70 port 59066 ssh2
...
2019-11-09 07:16:11
46.105.31.249 attackspam
Nov  8 22:55:17 localhost sshd\[15047\]: Invalid user cache!@\# from 46.105.31.249 port 49096
Nov  8 22:55:17 localhost sshd\[15047\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.31.249
Nov  8 22:55:19 localhost sshd\[15047\]: Failed password for invalid user cache!@\# from 46.105.31.249 port 49096 ssh2
Nov  8 22:58:24 localhost sshd\[15179\]: Invalid user QWE!@\#ZXC from 46.105.31.249 port 57312
Nov  8 22:58:24 localhost sshd\[15179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.31.249
...
2019-11-09 07:00:09
81.171.75.48 attackspam
\[2019-11-08 17:58:51\] NOTICE\[2601\] chan_sip.c: Registration from '\' failed for '81.171.75.48:62259' - Wrong password
\[2019-11-08 17:58:51\] SECURITY\[2634\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-11-08T17:58:51.203-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="5976",SessionID="0x7fdf2c8a8ab8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/81.171.75.48/62259",Challenge="73d73fc2",ReceivedChallenge="73d73fc2",ReceivedHash="961da874b1631035a818ad15a15e1950"
\[2019-11-08 17:59:28\] NOTICE\[2601\] chan_sip.c: Registration from '\' failed for '81.171.75.48:60048' - Wrong password
\[2019-11-08 17:59:28\] SECURITY\[2634\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-11-08T17:59:28.743-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="5596",SessionID="0x7fdf2c003608",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/81.171.75.48
2019-11-09 07:19:11
51.38.128.30 attackspambots
Nov  8 23:31:03 sso sshd[22638]: Failed password for root from 51.38.128.30 port 44506 ssh2
...
2019-11-09 07:23:17
5.172.239.186 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/5.172.239.186/ 
 
 PL - 1H : (120)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : PL 
 NAME ASN : ASN8374 
 
 IP : 5.172.239.186 
 
 CIDR : 5.172.224.0/19 
 
 PREFIX COUNT : 30 
 
 UNIQUE IP COUNT : 1321472 
 
 
 ATTACKS DETECTED ASN8374 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 3 
 
 DateTime : 2019-11-08 23:36:19 
 
 INFO : Server 301 - Looking for resource vulnerabilities Detected and Blocked by ADMIN  - data recovery
2019-11-09 06:59:14
51.91.251.177 attackspambots
Nov  9 01:24:53 server sshd\[31204\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.ip-51-91-251.eu  user=root
Nov  9 01:24:56 server sshd\[31204\]: Failed password for root from 51.91.251.177 port 44750 ssh2
Nov  9 01:36:10 server sshd\[1938\]: Invalid user cacti from 51.91.251.177
Nov  9 01:36:10 server sshd\[1938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.ip-51-91-251.eu 
Nov  9 01:36:12 server sshd\[1938\]: Failed password for invalid user cacti from 51.91.251.177 port 38132 ssh2
...
2019-11-09 07:04:19
27.71.225.85 attackspam
Nov  8 23:36:12 mout sshd[19818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.225.85  user=root
Nov  8 23:36:14 mout sshd[19818]: Failed password for root from 27.71.225.85 port 39648 ssh2
2019-11-09 07:02:08
80.184.84.163 attackspambots
Telnet Server BruteForce Attack
2019-11-09 07:16:42
222.221.248.242 attackbotsspam
2019-11-08T22:36:31.319763abusebot-6.cloudsearch.cf sshd\[4861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.221.248.242  user=root
2019-11-09 06:52:47
118.24.108.196 attackbotsspam
Nov  8 22:53:58 localhost sshd\[15019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.108.196  user=root
Nov  8 22:54:01 localhost sshd\[15019\]: Failed password for root from 118.24.108.196 port 55822 ssh2
Nov  8 22:57:58 localhost sshd\[15134\]: Invalid user odoo from 118.24.108.196 port 35974
Nov  8 22:57:58 localhost sshd\[15134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.108.196
Nov  8 22:58:00 localhost sshd\[15134\]: Failed password for invalid user odoo from 118.24.108.196 port 35974 ssh2
...
2019-11-09 07:22:44
192.99.15.141 attackspambots
Only those who intend to destroy a site make attempts like this below, so if this ip appears on your site, block it immediately    is high risk:

192.99.15.141 - - [08/Nov/2019:05:12:12 -0300] "GET /admin/images/cal_date_over.gif HTTP/1.1" 403 9
192.99.15.141 - - [08/Nov/2019:05:12:14 -0300] "GET /admin/images/cal_date_over.gif HTTP/1.1" 403 9
192.99.15.141 - - [08/Nov/2019:05:12:14 -0300] "GET /admin/login.php HTTP/1.1" 403 9
192.99.15.141 - - [08/Nov/2019:05:12:17 -0300] "GET /admin/login.php HTTP/1.1" 403 9
192.99.15.141 - - [08/Nov/2019:05:12:17 -0300] "GET /templates/system/css/system.css HTTP/1.1" 403 9
192.99.15.141 - - [08/Nov/2019:05:12:20 -0300] "GET /templates/system/css/system.css HTTP/1.1" 403 9
192.99.15.141 - - [08/Nov/2019:05:12:21 -0300] "GET / HTTP/1.1" 403 9
192.99.15.141 - - [08/Nov/2019:05:12:23 -0300] "GET / HTTP/1.1" 403 9
2019-11-09 06:48:27

Recently Reported IPs

212.81.21.112 36.116.154.138 33.47.146.240 130.79.165.24
43.138.201.232 14.68.117.152 53.24.244.157 129.212.56.48
51.61.64.44 247.49.214.178 207.9.62.193 33.160.53.153
146.129.83.195 189.138.173.78 226.247.235.245 49.76.101.216
117.184.87.252 140.126.135.226 172.82.46.251 164.9.248.54