Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: PlusServer GmbH

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 62.138.234.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60439
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;62.138.234.164.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051201 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon May 13 02:06:23 CST 2019
;; MSG SIZE  rcvd: 118

Host info
164.234.138.62.in-addr.arpa domain name pointer vm50492.psmanaged.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
164.234.138.62.in-addr.arpa	name = vm50492.psmanaged.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
103.42.57.65 attack
Unauthorized connection attempt detected from IP address 103.42.57.65 to port 2220 [J]
2020-02-05 17:26:25
23.129.64.211 attackspambots
Unauthorized connection attempt detected from IP address 23.129.64.211 to port 122 [J]
2020-02-05 17:34:46
61.74.22.29 attack
Unauthorized connection attempt detected from IP address 61.74.22.29 to port 23 [J]
2020-02-05 17:58:26
117.1.80.121 attackbotsspam
Unauthorized connection attempt detected from IP address 117.1.80.121 to port 23 [J]
2020-02-05 17:24:26
94.53.196.93 attack
Unauthorized connection attempt detected from IP address 94.53.196.93 to port 23 [J]
2020-02-05 17:55:37
42.114.181.141 attackspam
Unauthorized connection attempt detected from IP address 42.114.181.141 to port 23 [J]
2020-02-05 17:33:41
106.54.141.8 attack
Unauthorized connection attempt detected from IP address 106.54.141.8 to port 2220 [J]
2020-02-05 17:53:29
41.32.5.90 attackbots
Unauthorized connection attempt detected from IP address 41.32.5.90 to port 23 [J]
2020-02-05 18:02:08
221.145.234.38 attackspam
Unauthorized connection attempt detected from IP address 221.145.234.38 to port 4567 [J]
2020-02-05 17:37:56
167.250.177.233 attack
Unauthorized connection attempt detected from IP address 167.250.177.233 to port 5555 [J]
2020-02-05 17:20:29
125.31.19.94 attackbotsspam
Unauthorized connection attempt detected from IP address 125.31.19.94 to port 2220 [J]
2020-02-05 17:22:23
77.55.235.156 attackspambots
Feb  5 09:35:33 v22018076622670303 sshd\[32330\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.55.235.156  user=root
Feb  5 09:35:35 v22018076622670303 sshd\[32330\]: Failed password for root from 77.55.235.156 port 40780 ssh2
Feb  5 09:37:22 v22018076622670303 sshd\[32354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.55.235.156  user=root
...
2020-02-05 17:31:08
54.37.105.222 attack
Unauthorized connection attempt detected from IP address 54.37.105.222 to port 2220 [J]
2020-02-05 17:59:19
167.99.79.12 attackspam
Unauthorized connection attempt detected from IP address 167.99.79.12 to port 2220 [J]
2020-02-05 17:20:55
114.236.202.7 attack
Unauthorized connection attempt detected from IP address 114.236.202.7 to port 6656 [J]
2020-02-05 17:51:24

Recently Reported IPs

91.155.122.18 173.236.152.108 170.12.81.57 159.147.59.175
106.208.125.93 185.94.213.134 172.216.121.20 49.66.218.229
223.9.17.48 80.226.216.230 95.79.50.240 147.220.59.187
201.68.178.125 156.28.143.39 8.103.3.63 180.172.169.68
39.176.216.0 129.29.91.21 125.140.146.104 209.151.2.159