Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Dortmund

Region: Nordrhein-Westfalen

Country: Germany

Internet Service Provider: Telekom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 84.138.156.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42028
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;84.138.156.8.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062801 1800 900 604800 86400

;; Query time: 86 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 29 02:17:43 CST 2025
;; MSG SIZE  rcvd: 105
Host info
8.156.138.84.in-addr.arpa domain name pointer p548a9c08.dip0.t-ipconnect.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
8.156.138.84.in-addr.arpa	name = p548a9c08.dip0.t-ipconnect.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.233.185.109 attackspam
Aug  4 11:36:31 master sshd[21935]: Failed password for root from 49.233.185.109 port 46400 ssh2
Aug  4 11:46:19 master sshd[22201]: Failed password for root from 49.233.185.109 port 47074 ssh2
Aug  4 11:49:11 master sshd[22238]: Failed password for root from 49.233.185.109 port 46464 ssh2
Aug  4 11:52:07 master sshd[22354]: Failed password for root from 49.233.185.109 port 45848 ssh2
Aug  4 11:54:49 master sshd[22408]: Failed password for root from 49.233.185.109 port 45224 ssh2
Aug  4 11:57:34 master sshd[22479]: Failed password for root from 49.233.185.109 port 44584 ssh2
Aug  4 12:00:09 master sshd[22972]: Failed password for root from 49.233.185.109 port 43944 ssh2
Aug  4 12:02:46 master sshd[23010]: Failed password for root from 49.233.185.109 port 43298 ssh2
Aug  4 12:05:26 master sshd[23083]: Failed password for root from 49.233.185.109 port 42668 ssh2
Aug  4 12:08:11 master sshd[23119]: Failed password for root from 49.233.185.109 port 42032 ssh2
2020-08-05 00:17:01
110.159.114.57 attackbots
WordPress XMLRPC scan :: 110.159.114.57 0.116 - [04/Aug/2020:09:21:30  0000] [censored_1] "POST /xmlrpc.php HTTP/1.1" 200 236 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1"
2020-08-04 23:43:04
148.235.57.184 attackbotsspam
Aug  4 13:46:30 vps333114 sshd[18653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.235.57.184  user=root
Aug  4 13:46:32 vps333114 sshd[18653]: Failed password for root from 148.235.57.184 port 35240 ssh2
...
2020-08-05 00:10:21
192.144.230.43 attackspam
Aug  4 11:21:28 fhem-rasp sshd[12299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.230.43  user=root
Aug  4 11:21:31 fhem-rasp sshd[12299]: Failed password for root from 192.144.230.43 port 51906 ssh2
...
2020-08-04 23:40:56
74.124.24.114 attackbotsspam
Aug  4 13:37:36 piServer sshd[5190]: Failed password for root from 74.124.24.114 port 50930 ssh2
Aug  4 13:40:40 piServer sshd[5673]: Failed password for root from 74.124.24.114 port 43168 ssh2
...
2020-08-04 23:50:58
159.89.2.220 attack
159.89.2.220 - - [04/Aug/2020:13:21:05 +0200] "GET /wp-login.php HTTP/1.1" 200 6060 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.89.2.220 - - [04/Aug/2020:13:21:05 +0200] "POST /wp-login.php HTTP/1.1" 200 6311 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.89.2.220 - - [04/Aug/2020:13:21:06 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-04 23:58:30
106.12.174.227 attackspambots
Aug  4 14:27:21 vps639187 sshd\[20118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.174.227  user=root
Aug  4 14:27:23 vps639187 sshd\[20118\]: Failed password for root from 106.12.174.227 port 49782 ssh2
Aug  4 14:32:56 vps639187 sshd\[20245\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.174.227  user=root
...
2020-08-04 23:46:22
13.90.40.99 attack
Forbidden directory scan :: 2020/08/04 09:57:22 [error] 971#971: *263925 access forbidden by rule, client: 13.90.40.99, server: [censored_1], request: "GET /.env HTTP/1.1", host: "www.[censored_1]"
2020-08-05 00:11:27
148.229.3.242 attack
Aug  4 23:40:09 localhost sshd[3474027]: Connection closed by 148.229.3.242 port 34914 [preauth]
...
2020-08-04 23:41:50
72.143.100.14 attackspam
"Unauthorized connection attempt on SSHD detected"
2020-08-04 23:54:01
176.107.133.228 attackbots
Aug  4 11:35:51 master sshd[21925]: Failed password for root from 176.107.133.228 port 54368 ssh2
Aug  4 11:47:31 master sshd[22218]: Failed password for root from 176.107.133.228 port 35078 ssh2
Aug  4 11:52:57 master sshd[22366]: Failed password for root from 176.107.133.228 port 48274 ssh2
Aug  4 11:58:17 master sshd[22491]: Failed password for root from 176.107.133.228 port 34568 ssh2
Aug  4 12:03:28 master sshd[23018]: Failed password for root from 176.107.133.228 port 47666 ssh2
Aug  4 12:08:41 master sshd[23127]: Failed password for root from 176.107.133.228 port 33010 ssh2
Aug  4 12:13:48 master sshd[23316]: Failed password for root from 176.107.133.228 port 47624 ssh2
Aug  4 12:18:50 master sshd[23441]: Failed password for root from 176.107.133.228 port 60828 ssh2
2020-08-05 00:12:04
139.162.168.38 attack
 UDP 139.162.168.38:44674 -> port 3702, len 656
2020-08-04 23:49:04
167.71.130.153 attack
167.71.130.153 - - [04/Aug/2020:10:21:03 +0100] "POST /wp-login.php HTTP/1.1" 200 1839 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.71.130.153 - - [04/Aug/2020:10:21:04 +0100] "POST /wp-login.php HTTP/1.1" 200 1845 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.71.130.153 - - [04/Aug/2020:10:21:04 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-05 00:15:51
206.189.128.158 attackspambots
206.189.128.158 - - \[04/Aug/2020:11:21:10 +0200\] "POST /wp-login.php HTTP/1.0" 200 6827 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
206.189.128.158 - - \[04/Aug/2020:11:21:12 +0200\] "POST /wp-login.php HTTP/1.0" 200 6642 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
206.189.128.158 - - \[04/Aug/2020:11:21:14 +0200\] "POST /wp-login.php HTTP/1.0" 200 6639 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-08-04 23:59:13
61.177.172.41 attackbotsspam
failed root login
2020-08-05 00:10:46

Recently Reported IPs

91.55.236.22 88.176.206.116 71.123.107.249 72.115.7.236
68.150.254.156 68.43.149.241 6.184.155.159 59.52.114.10
54.111.39.64 55.94.153.66 54.155.131.142 52.212.235.123
53.22.84.179 53.110.255.136 44.197.126.98 43.168.213.148
44.136.10.104 44.62.80.210 42.151.169.106 4.153.92.93