Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: San Antonio

Region: Texas

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.189.168.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41746
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;52.189.168.138.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031303 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 14 09:47:19 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 138.168.189.52.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.168.189.52.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.81.84.140 attackbots
xmlrpc attack
2019-11-29 00:40:59
106.12.93.160 attack
Nov 28 17:22:43 [host] sshd[8841]: Invalid user 7890 from 106.12.93.160
Nov 28 17:22:43 [host] sshd[8841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.93.160
Nov 28 17:22:45 [host] sshd[8841]: Failed password for invalid user 7890 from 106.12.93.160 port 50048 ssh2
2019-11-29 00:47:36
159.89.115.126 attack
Nov 28 06:24:09 eddieflores sshd\[5963\]: Invalid user carla from 159.89.115.126
Nov 28 06:24:09 eddieflores sshd\[5963\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.115.126
Nov 28 06:24:11 eddieflores sshd\[5963\]: Failed password for invalid user carla from 159.89.115.126 port 43572 ssh2
Nov 28 06:30:27 eddieflores sshd\[7188\]: Invalid user srand from 159.89.115.126
Nov 28 06:30:27 eddieflores sshd\[7188\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.115.126
2019-11-29 00:37:36
218.92.0.180 attackbots
$f2bV_matches_ltvn
2019-11-29 00:21:47
103.79.143.210 attackspam
" "
2019-11-29 00:46:13
175.145.234.225 attackspambots
2019-11-28T15:38:19.645676tmaserv sshd\[9203\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.145.234.225
2019-11-28T15:38:21.741735tmaserv sshd\[9203\]: Failed password for invalid user sampat from 175.145.234.225 port 42491 ssh2
2019-11-28T16:39:34.163087tmaserv sshd\[12005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.145.234.225  user=root
2019-11-28T16:39:35.770746tmaserv sshd\[12005\]: Failed password for root from 175.145.234.225 port 60825 ssh2
2019-11-28T16:46:51.550822tmaserv sshd\[12397\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.145.234.225  user=root
2019-11-28T16:46:53.485740tmaserv sshd\[12397\]: Failed password for root from 175.145.234.225 port 50592 ssh2
...
2019-11-29 00:54:41
14.249.150.85 attack
Nov 28 16:08:00 raspberrypi sshd\[5742\]: Invalid user admin from 14.249.150.85
...
2019-11-29 00:27:57
5.8.37.38 attackspam
REQUESTED PAGE: /hsvc_gallery/main.php?g2_view=shutterfly.PrintPhotos&g2_itemId=1475&g2_returnUrl=http%3A%2F%2Fwww2.hsvc.co.nz%2Fhsvc_gallery%2Fmain.php%3Fg2_itemId%3D1475&g2_authToken=100fb0734248
2019-11-29 00:16:52
119.3.222.183 attackbots
CMS brute force
...
2019-11-29 00:42:07
124.74.248.218 attackspambots
Nov 28 17:21:31 legacy sshd[1075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.74.248.218
Nov 28 17:21:33 legacy sshd[1075]: Failed password for invalid user huichaun from 124.74.248.218 port 33454 ssh2
Nov 28 17:25:39 legacy sshd[1214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.74.248.218
...
2019-11-29 00:32:22
194.61.24.102 attack
Honeypot hit.
2019-11-29 00:15:15
77.98.190.7 attackbots
2019-11-28T16:27:16.423797abusebot-8.cloudsearch.cf sshd\[12103\]: Invalid user landry from 77.98.190.7 port 45269
2019-11-29 00:30:36
121.160.198.198 attackspam
Automatic report - Banned IP Access
2019-11-29 00:16:33
120.29.159.162 attackbotsspam
Nov 28 14:37:48 system,error,critical: login failure for user admin from 120.29.159.162 via telnet
Nov 28 14:37:49 system,error,critical: login failure for user root from 120.29.159.162 via telnet
Nov 28 14:37:50 system,error,critical: login failure for user root from 120.29.159.162 via telnet
Nov 28 14:37:51 system,error,critical: login failure for user root from 120.29.159.162 via telnet
Nov 28 14:37:52 system,error,critical: login failure for user admin from 120.29.159.162 via telnet
Nov 28 14:37:53 system,error,critical: login failure for user root from 120.29.159.162 via telnet
Nov 28 14:37:55 system,error,critical: login failure for user admin from 120.29.159.162 via telnet
Nov 28 14:37:56 system,error,critical: login failure for user root from 120.29.159.162 via telnet
Nov 28 14:37:57 system,error,critical: login failure for user root from 120.29.159.162 via telnet
Nov 28 14:37:58 system,error,critical: login failure for user administrator from 120.29.159.162 via telnet
2019-11-29 00:40:11
49.51.163.30 attackspam
49.51.163.30 - - \[28/Nov/2019:17:11:18 +0100\] "POST /wp-login.php HTTP/1.0" 200 7656 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
49.51.163.30 - - \[28/Nov/2019:17:11:19 +0100\] "POST /wp-login.php HTTP/1.0" 200 7486 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
49.51.163.30 - - \[28/Nov/2019:17:11:19 +0100\] "POST /wp-login.php HTTP/1.0" 200 7480 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-29 00:44:34

Recently Reported IPs

64.225.248.0 129.151.206.109 84.87.178.132 186.158.208.31
12.90.41.20 64.226.0.0 216.139.181.130 87.169.116.236
200.169.238.231 146.222.224.35 198.154.56.134 208.79.13.30
64.226.16.0 91.248.248.241 59.25.152.88 152.138.140.151
244.145.233.34 210.220.75.191 147.152.45.142 152.141.132.151