Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Memphis

Region: Tennessee

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 76.138.45.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22868
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;76.138.45.21.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 14:11:42 CST 2025
;; MSG SIZE  rcvd: 105
Host info
21.45.138.76.in-addr.arpa domain name pointer c-76-138-45-21.hsd1.tn.comcast.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.45.138.76.in-addr.arpa	name = c-76-138-45-21.hsd1.tn.comcast.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
69.90.16.116 attack
Sep 14 20:48:29 microserver sshd[34334]: Invalid user kibana from 69.90.16.116 port 55718
Sep 14 20:48:29 microserver sshd[34334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.90.16.116
Sep 14 20:48:30 microserver sshd[34334]: Failed password for invalid user kibana from 69.90.16.116 port 55718 ssh2
Sep 14 20:52:42 microserver sshd[35017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.90.16.116  user=ftp
Sep 14 20:52:44 microserver sshd[35017]: Failed password for ftp from 69.90.16.116 port 44422 ssh2
Sep 14 21:05:22 microserver sshd[36741]: Invalid user ju from 69.90.16.116 port 37890
Sep 14 21:05:22 microserver sshd[36741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.90.16.116
Sep 14 21:05:25 microserver sshd[36741]: Failed password for invalid user ju from 69.90.16.116 port 37890 ssh2
Sep 14 21:09:49 microserver sshd[37326]: Invalid user amanda from 69.90.16.116 port 548
2019-09-15 03:45:34
5.178.232.60 attackspambots
Port 1433 Scan
2019-09-15 03:38:33
189.253.8.251 attackbotsspam
Honeypot attack, port: 445, PTR: dsl-189-253-8-251-dyn.prod-infinitum.com.mx.
2019-09-15 03:51:20
36.103.243.247 attackbots
Sep 14 21:34:01 root sshd[23113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.103.243.247 
Sep 14 21:34:03 root sshd[23113]: Failed password for invalid user david from 36.103.243.247 port 57172 ssh2
Sep 14 21:38:48 root sshd[23151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.103.243.247 
...
2019-09-15 03:42:41
213.231.132.219 attack
port scan and connect, tcp 23 (telnet)
2019-09-15 03:52:14
5.59.38.128 attackbotsspam
Port 1433 Scan
2019-09-15 03:37:33
41.239.188.135 attackbotsspam
Honeypot attack, port: 23, PTR: host-41.239.188.135.tedata.net.
2019-09-15 04:12:22
139.211.62.87 attackspam
(Sep 14)  LEN=40 TTL=49 ID=40171 TCP DPT=8080 WINDOW=10053 SYN 
 (Sep 14)  LEN=40 TTL=49 ID=27475 TCP DPT=8080 WINDOW=45072 SYN 
 (Sep 14)  LEN=40 TTL=49 ID=7299 TCP DPT=8080 WINDOW=57071 SYN 
 (Sep 13)  LEN=40 TTL=49 ID=44065 TCP DPT=8080 WINDOW=42127 SYN 
 (Sep 13)  LEN=40 TTL=49 ID=30413 TCP DPT=8080 WINDOW=54709 SYN 
 (Sep 12)  LEN=40 TTL=49 ID=8299 TCP DPT=8080 WINDOW=10053 SYN 
 (Sep 12)  LEN=40 TTL=49 ID=22448 TCP DPT=8080 WINDOW=54709 SYN 
 (Sep 12)  LEN=40 TTL=49 ID=18454 TCP DPT=8080 WINDOW=57071 SYN 
 (Sep 12)  LEN=40 TTL=49 ID=46894 TCP DPT=8080 WINDOW=45072 SYN 
 (Sep 12)  LEN=40 TTL=49 ID=537 TCP DPT=8080 WINDOW=10053 SYN 
 (Sep 11)  LEN=40 TTL=49 ID=63566 TCP DPT=8080 WINDOW=57071 SYN 
 (Sep 11)  LEN=40 TTL=49 ID=34586 TCP DPT=8080 WINDOW=10053 SYN 
 (Sep 10)  LEN=40 TTL=49 ID=7640 TCP DPT=8080 WINDOW=54709 SYN 
 (Sep 10)  LEN=40 TTL=49 ID=9240 TCP DPT=8080 WINDOW=10053 SYN 
 (Sep  9)  LEN=40 TTL=49 ID=18250 TCP DPT=8080 WINDOW=57071 SYN 
 (Sep  9)  LEN=40 TTL=49 ID=284...
2019-09-15 04:06:45
186.64.121.145 attackbots
Sep 14 21:22:19 ArkNodeAT sshd\[16880\]: Invalid user elfrida from 186.64.121.145
Sep 14 21:22:19 ArkNodeAT sshd\[16880\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.64.121.145
Sep 14 21:22:21 ArkNodeAT sshd\[16880\]: Failed password for invalid user elfrida from 186.64.121.145 port 48840 ssh2
2019-09-15 04:16:36
49.88.112.85 attackbotsspam
2019-09-14T19:29:57.486939abusebot.cloudsearch.cf sshd\[17113\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.85  user=root
2019-09-15 03:38:07
3.17.172.171 attackbots
Sep 14 21:21:30 www sshd\[165858\]: Invalid user ubnt from 3.17.172.171
Sep 14 21:21:30 www sshd\[165858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.17.172.171
Sep 14 21:21:32 www sshd\[165858\]: Failed password for invalid user ubnt from 3.17.172.171 port 41108 ssh2
...
2019-09-15 04:05:10
59.120.154.25 attackbotsspam
Honeypot attack, port: 23, PTR: 59-120-154-25.HINET-IP.hinet.net.
2019-09-15 04:20:31
115.84.99.178 attackbotsspam
Chat Spam
2019-09-15 04:17:49
185.110.127.26 attackbots
Sep 14 22:53:40 server sshd\[11061\]: Invalid user WorldDomination from 185.110.127.26 port 59490
Sep 14 22:53:40 server sshd\[11061\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.110.127.26
Sep 14 22:53:43 server sshd\[11061\]: Failed password for invalid user WorldDomination from 185.110.127.26 port 59490 ssh2
Sep 14 22:58:32 server sshd\[17186\]: Invalid user 123456 from 185.110.127.26 port 54122
Sep 14 22:58:32 server sshd\[17186\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.110.127.26
2019-09-15 04:14:18
79.127.55.189 attack
ssh failed login
2019-09-15 04:22:36

Recently Reported IPs

160.193.9.221 78.166.96.101 162.133.55.86 122.147.242.150
19.24.72.141 44.79.87.64 194.83.168.68 178.159.37.171
142.245.153.60 196.108.168.42 108.245.236.173 53.127.76.184
186.29.252.120 138.103.140.94 119.212.11.63 241.11.64.3
114.37.167.90 235.95.239.67 184.147.174.184 190.50.232.254