Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Guangzhou

Region: Guangdong

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 8.138.16.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33743
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;8.138.16.241.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025112003 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 21 12:30:44 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 241.16.138.8.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 241.16.138.8.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
190.217.31.4 attackspam
Unauthorized connection attempt from IP address 190.217.31.4 on Port 445(SMB)
2020-02-10 03:52:45
14.231.248.255 attackspambots
Unauthorized connection attempt from IP address 14.231.248.255 on Port 445(SMB)
2020-02-10 04:07:59
45.55.6.42 attackbots
Feb  9 14:42:44 silence02 sshd[31932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.6.42
Feb  9 14:42:45 silence02 sshd[31932]: Failed password for invalid user vwe from 45.55.6.42 port 52681 ssh2
Feb  9 14:45:53 silence02 sshd[32134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.6.42
2020-02-10 04:12:02
78.128.113.89 attackbots
Password Brute-Forcing our Mailserver.
2020-02-10 04:11:42
148.102.53.178 attack
Unauthorized connection attempt from IP address 148.102.53.178 on Port 445(SMB)
2020-02-10 03:59:05
51.79.66.142 attackspambots
Feb  9 17:42:17 sigma sshd\[27079\]: Invalid user xuu from 51.79.66.142Feb  9 17:42:20 sigma sshd\[27079\]: Failed password for invalid user xuu from 51.79.66.142 port 43966 ssh2
...
2020-02-10 04:06:50
103.92.225.36 attackbotsspam
Unauthorized connection attempt from IP address 103.92.225.36 on Port 445(SMB)
2020-02-10 03:54:53
49.88.112.65 attackbotsspam
Feb  9 09:38:01 hanapaa sshd\[32253\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
Feb  9 09:38:04 hanapaa sshd\[32253\]: Failed password for root from 49.88.112.65 port 10038 ssh2
Feb  9 09:40:37 hanapaa sshd\[32554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
Feb  9 09:40:40 hanapaa sshd\[32554\]: Failed password for root from 49.88.112.65 port 13019 ssh2
Feb  9 09:41:43 hanapaa sshd\[32631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
2020-02-10 03:58:42
159.203.124.234 attack
SSH Brute-Forcing (server2)
2020-02-10 04:09:02
113.184.168.25 attack
Unauthorized connection attempt from IP address 113.184.168.25 on Port 445(SMB)
2020-02-10 03:47:32
185.153.199.229 attackbotsspam
port
2020-02-10 03:55:30
103.195.142.65 attack
$f2bV_matches
2020-02-10 04:16:07
14.138.252.171 attack
Unauthorized connection attempt from IP address 14.138.252.171 on Port 3389(RDP)
2020-02-10 03:44:59
122.51.156.53 attackspambots
Feb  9 16:17:02 server sshd\[21105\]: Invalid user zid from 122.51.156.53
Feb  9 16:17:02 server sshd\[21105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.156.53 
Feb  9 16:17:04 server sshd\[21105\]: Failed password for invalid user zid from 122.51.156.53 port 52730 ssh2
Feb  9 16:30:28 server sshd\[23568\]: Invalid user nht from 122.51.156.53
Feb  9 16:30:28 server sshd\[23568\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.156.53 
...
2020-02-10 04:02:40
122.154.251.22 attackbots
Feb  9 15:34:11 MK-Soft-Root2 sshd[22465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.154.251.22 
Feb  9 15:34:13 MK-Soft-Root2 sshd[22465]: Failed password for invalid user aqo from 122.154.251.22 port 51400 ssh2
...
2020-02-10 03:53:18

Recently Reported IPs

117.255.150.193 66.249.77.73 66.249.77.77 66.249.77.76
66.249.77.75 66.249.77.74 10.1.15.75 93.123.109.225
119.68.41.147 172.237.111.117 240e:476:bcc5:c788:e42d:b9bd:6f84:12d3 157.230.29.20
125.188.25.6 97.58.237.65 218.24.4.47 111.56.58.110
152.162.250.66 152.136.211.172 38.54.88.104 66.248.205.165