Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.169.230.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37955
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.169.230.138.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 20:08:25 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 138.230.169.48.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.230.169.48.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.12.186.121 attack
Invalid user applorig from 106.12.186.121 port 55441
2020-03-27 07:01:14
139.198.190.182 attack
Invalid user maluks from 139.198.190.182 port 40223
2020-03-27 07:25:47
95.167.225.111 attackbotsspam
Invalid user leroi from 95.167.225.111 port 34782
2020-03-27 07:22:43
167.99.170.160 attackspambots
Invalid user admin from 167.99.170.160 port 60940
2020-03-27 07:16:36
177.155.128.153 attackspam
Port probing on unauthorized port 8080
2020-03-27 07:25:34
14.242.195.38 attack
1585257508 - 03/26/2020 22:18:28 Host: 14.242.195.38/14.242.195.38 Port: 445 TCP Blocked
2020-03-27 07:21:25
178.62.23.60 attackbotsspam
Mar 26 23:21:35 OPSO sshd\[25260\]: Invalid user thc from 178.62.23.60 port 60694
Mar 26 23:21:35 OPSO sshd\[25260\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.23.60
Mar 26 23:21:37 OPSO sshd\[25260\]: Failed password for invalid user thc from 178.62.23.60 port 60694 ssh2
Mar 26 23:29:27 OPSO sshd\[27166\]: Invalid user ggy from 178.62.23.60 port 46340
Mar 26 23:29:27 OPSO sshd\[27166\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.23.60
2020-03-27 06:52:40
59.127.147.145 attack
Unauthorised access (Mar 26) SRC=59.127.147.145 LEN=44 TTL=43 ID=63423 TCP DPT=8080 WINDOW=25557 SYN 
Unauthorised access (Mar 25) SRC=59.127.147.145 LEN=44 TTL=43 ID=34398 TCP DPT=8080 WINDOW=25557 SYN
2020-03-27 07:13:46
51.83.41.120 attack
SSH Invalid Login
2020-03-27 06:53:08
23.100.106.135 attack
(sshd) Failed SSH login from 23.100.106.135 (JP/Japan/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 26 17:17:44 localhost sshd[11862]: Invalid user ppo from 23.100.106.135 port 34152
Mar 26 17:17:47 localhost sshd[11862]: Failed password for invalid user ppo from 23.100.106.135 port 34152 ssh2
Mar 26 17:30:00 localhost sshd[12751]: Invalid user ofr from 23.100.106.135 port 40726
Mar 26 17:30:01 localhost sshd[12751]: Failed password for invalid user ofr from 23.100.106.135 port 40726 ssh2
Mar 26 17:38:25 localhost sshd[13413]: Invalid user nne from 23.100.106.135 port 34896
2020-03-27 07:17:11
14.232.243.10 attackbots
2020-03-26T23:00:56.549186shield sshd\[23354\]: Invalid user fax from 14.232.243.10 port 44256
2020-03-26T23:00:56.554386shield sshd\[23354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.232.243.10
2020-03-26T23:00:58.841661shield sshd\[23354\]: Failed password for invalid user fax from 14.232.243.10 port 44256 ssh2
2020-03-26T23:07:08.275515shield sshd\[24848\]: Invalid user swyer from 14.232.243.10 port 54346
2020-03-26T23:07:08.285487shield sshd\[24848\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.232.243.10
2020-03-27 07:11:17
183.82.34.162 attackspambots
Mar 27 00:57:41 pkdns2 sshd\[25848\]: Address 183.82.34.162 maps to broadband.actcorp.in, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Mar 27 00:57:41 pkdns2 sshd\[25848\]: Invalid user rtg from 183.82.34.162Mar 27 00:57:43 pkdns2 sshd\[25848\]: Failed password for invalid user rtg from 183.82.34.162 port 53790 ssh2Mar 27 01:02:49 pkdns2 sshd\[26131\]: Address 183.82.34.162 maps to broadband.actcorp.in, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Mar 27 01:02:49 pkdns2 sshd\[26131\]: Invalid user ylj from 183.82.34.162Mar 27 01:02:51 pkdns2 sshd\[26131\]: Failed password for invalid user ylj from 183.82.34.162 port 36706 ssh2
...
2020-03-27 07:14:06
51.75.30.214 attackspambots
SSH Invalid Login
2020-03-27 06:52:07
51.38.186.180 attackbotsspam
Invalid user kx from 51.38.186.180 port 46616
2020-03-27 07:14:23
220.149.231.165 attackspam
SSH brutforce
2020-03-27 07:05:34

Recently Reported IPs

33.17.29.4 8.6.73.245 116.197.246.131 186.198.113.158
249.73.35.230 29.248.184.127 135.71.87.64 152.96.213.93
204.217.45.194 147.135.5.74 136.162.210.133 114.155.212.171
248.153.57.141 89.27.247.21 252.79.238.68 37.176.232.105
253.157.185.252 21.225.194.20 222.27.137.46 41.224.144.97