Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.67.135.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21215
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;53.67.135.138.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012801 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 05:17:52 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 138.135.67.53.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.135.67.53.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
153.36.232.49 attackspambots
Jul  9 00:18:54 areeb-Workstation sshd\[5683\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.232.49  user=root
Jul  9 00:18:57 areeb-Workstation sshd\[5683\]: Failed password for root from 153.36.232.49 port 27072 ssh2
Jul  9 00:19:05 areeb-Workstation sshd\[5723\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.232.49  user=root
...
2019-07-09 03:12:50
118.24.104.152 attackspam
2019-07-08T20:48:06.8510491240 sshd\[32118\]: Invalid user production from 118.24.104.152 port 54216
2019-07-08T20:48:06.8649841240 sshd\[32118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.104.152
2019-07-08T20:48:09.1937691240 sshd\[32118\]: Failed password for invalid user production from 118.24.104.152 port 54216 ssh2
...
2019-07-09 03:30:29
106.13.68.27 attackspambots
Jul  8 20:42:28 ns341937 sshd[22240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.68.27
Jul  8 20:42:30 ns341937 sshd[22240]: Failed password for invalid user ftp2 from 106.13.68.27 port 48906 ssh2
Jul  8 20:49:07 ns341937 sshd[23279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.68.27
...
2019-07-09 03:13:08
113.53.29.20 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-08 10:27:13,363 INFO [shellcode_manager] (113.53.29.20) no match, writing hexdump (855a45cc6e7998a887c4aac5e9ec67c2 :2257393) - MS17010 (EternalBlue)
2019-07-09 03:14:44
27.72.246.104 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-08 10:27:16,091 INFO [shellcode_manager] (27.72.246.104) no match, writing hexdump (ab301bde346c02a09c518530defa6534 :12083) - SMB (Unknown)
2019-07-09 03:11:05
91.177.117.66 attack
Jul  8 20:40:46 ns37 sshd[23796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.177.117.66
Jul  8 20:40:48 ns37 sshd[23796]: Failed password for invalid user admin from 91.177.117.66 port 55554 ssh2
Jul  8 20:49:06 ns37 sshd[25062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.177.117.66
2019-07-09 03:13:54
178.128.194.208 attackspambots
villaromeo.de 178.128.194.208 \[08/Jul/2019:20:48:23 +0200\] "POST /wp-login.php HTTP/1.1" 200 2061 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
villaromeo.de 178.128.194.208 \[08/Jul/2019:20:48:23 +0200\] "POST /wp-login.php HTTP/1.1" 200 2026 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
villaromeo.de 178.128.194.208 \[08/Jul/2019:20:48:24 +0200\] "POST /wp-login.php HTTP/1.1" 200 2025 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-07-09 03:24:13
94.204.254.153 attackspambots
23/tcp
[2019-07-08]1pkt
2019-07-09 03:32:36
110.240.29.43 attack
Jul  8 20:48:35 ubuntu-2gb-fsn1-1 sshd[14992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.240.29.43
Jul  8 20:48:37 ubuntu-2gb-fsn1-1 sshd[14992]: Failed password for invalid user support from 110.240.29.43 port 34664 ssh2
...
2019-07-09 03:21:10
68.183.197.125 attack
Jul  8 09:53:04 XXX sshd[24025]: User r.r from 68.183.197.125 not allowed because none of user's groups are listed in AllowGroups
Jul  8 09:53:04 XXX sshd[24025]: Received disconnect from 68.183.197.125: 11: Bye Bye [preauth]
Jul  8 09:53:05 XXX sshd[24027]: Invalid user admin from 68.183.197.125
Jul  8 09:53:05 XXX sshd[24027]: Received disconnect from 68.183.197.125: 11: Bye Bye [preauth]
Jul  8 09:53:06 XXX sshd[24029]: Invalid user admin from 68.183.197.125
Jul  8 09:53:06 XXX sshd[24029]: Received disconnect from 68.183.197.125: 11: Bye Bye [preauth]
Jul  8 09:53:07 XXX sshd[24031]: Invalid user user from 68.183.197.125
Jul  8 09:53:07 XXX sshd[24031]: Received disconnect from 68.183.197.125: 11: Bye Bye [preauth]
Jul  8 09:53:08 XXX sshd[24033]: Invalid user ubnt from 68.183.197.125
Jul  8 09:53:08 XXX sshd[24033]: Received disconnect from 68.183.197.125: 11: Bye Bye [preauth]
Jul  8 09:53:09 XXX sshd[24035]: Invalid user admin from 68.183.197.125
Jul  8 09:53:09 ........
-------------------------------
2019-07-09 03:40:46
86.202.95.60 attackspam
wordpress exploit scan
...
2019-07-09 03:08:02
61.227.183.57 attack
37215/tcp
[2019-07-08]1pkt
2019-07-09 03:29:35
107.170.201.203 attack
Automatic report - Web App Attack
2019-07-09 03:02:38
58.40.26.126 attackspambots
Multiple failed RDP login attempts
2019-07-09 03:15:08
2.28.125.65 attack
Chat Spam
2019-07-09 02:54:11

Recently Reported IPs

108.89.10.125 93.198.229.72 248.2.77.97 179.205.19.116
195.210.205.211 208.192.200.225 189.36.1.15 5.155.122.255
38.56.226.10 119.156.92.8 143.245.119.125 113.255.243.247
180.236.134.64 73.145.171.189 52.122.63.108 225.146.46.56
185.176.87.16 208.80.76.96 50.128.82.159 232.205.93.239