Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Erlinsbach AG

Region: Aargau

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.138.30.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58618
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;91.138.30.144.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121101 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 12 02:02:01 CST 2024
;; MSG SIZE  rcvd: 106
Host info
144.30.138.91.in-addr.arpa domain name pointer 144-30-138-91.dyn.cable.qlnet.ch.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
144.30.138.91.in-addr.arpa	name = 144-30-138-91.dyn.cable.qlnet.ch.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
121.201.123.252 attackbotsspam
Invalid user qx from 121.201.123.252 port 46686
2020-04-25 07:13:05
206.189.164.136 attackspam
Apr 25 00:35:35 server sshd[22799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.164.136
Apr 25 00:35:37 server sshd[22799]: Failed password for invalid user casen from 206.189.164.136 port 47486 ssh2
Apr 25 00:40:39 server sshd[23835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.164.136
...
2020-04-25 06:54:56
185.50.149.13 attackbots
2020-04-24T23:48:10.472446l03.customhost.org.uk postfix/smtps/smtpd[10750]: warning: unknown[185.50.149.13]: SASL LOGIN authentication failed: authentication failure
2020-04-24T23:48:17.217807l03.customhost.org.uk postfix/smtps/smtpd[10750]: warning: unknown[185.50.149.13]: SASL LOGIN authentication failed: authentication failure
2020-04-24T23:53:55.335689l03.customhost.org.uk postfix/smtps/smtpd[11892]: warning: unknown[185.50.149.13]: SASL LOGIN authentication failed: authentication failure
2020-04-24T23:54:02.072792l03.customhost.org.uk postfix/smtps/smtpd[11892]: warning: unknown[185.50.149.13]: SASL LOGIN authentication failed: authentication failure
...
2020-04-25 07:02:04
114.67.112.120 attack
Invalid user test from 114.67.112.120 port 36746
2020-04-25 07:23:48
211.254.179.221 attackbotsspam
2020-04-24T22:59:42.979169shield sshd\[28042\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.254.179.221  user=root
2020-04-24T22:59:44.683091shield sshd\[28042\]: Failed password for root from 211.254.179.221 port 34708 ssh2
2020-04-24T23:05:58.221352shield sshd\[29021\]: Invalid user monkey from 211.254.179.221 port 36719
2020-04-24T23:05:58.225548shield sshd\[29021\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.254.179.221
2020-04-24T23:05:59.879419shield sshd\[29021\]: Failed password for invalid user monkey from 211.254.179.221 port 36719 ssh2
2020-04-25 07:23:05
125.212.203.113 attackbotsspam
Invalid user hi from 125.212.203.113 port 51494
2020-04-25 07:03:01
194.61.27.248 attackbotsspam
Unauthorized connection attempt from IP address 194.61.27.248 on Port 3389(RDP)
2020-04-25 06:53:16
79.122.97.57 attackbotsspam
SSH Invalid Login
2020-04-25 06:53:56
106.124.129.115 attackspambots
Invalid user vv from 106.124.129.115 port 36380
2020-04-25 07:25:16
222.186.30.76 attackspambots
Apr 25 00:48:19 home sshd[15215]: Failed password for root from 222.186.30.76 port 36573 ssh2
Apr 25 00:48:21 home sshd[15215]: Failed password for root from 222.186.30.76 port 36573 ssh2
Apr 25 00:48:23 home sshd[15215]: Failed password for root from 222.186.30.76 port 36573 ssh2
...
2020-04-25 06:58:04
106.12.5.190 attackspam
SASL PLAIN auth failed: ruser=...
2020-04-25 07:19:24
170.247.204.3 attack
Apr 25 00:40:51 mail.srvfarm.net postfix/smtpd[560962]: warning: unknown[170.247.204.3]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 25 00:40:51 mail.srvfarm.net postfix/smtpd[560962]: lost connection after AUTH from unknown[170.247.204.3]
Apr 25 00:43:23 mail.srvfarm.net postfix/smtpd[743336]: warning: unknown[170.247.204.3]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 25 00:43:23 mail.srvfarm.net postfix/smtpd[743336]: lost connection after AUTH from unknown[170.247.204.3]
Apr 25 00:46:04 mail.srvfarm.net postfix/smtpd[743336]: warning: unknown[170.247.204.3]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-04-25 07:02:36
180.76.177.194 attackbots
Apr 24 23:31:33 vps58358 sshd\[12764\]: Invalid user th from 180.76.177.194Apr 24 23:31:36 vps58358 sshd\[12764\]: Failed password for invalid user th from 180.76.177.194 port 47862 ssh2Apr 24 23:36:12 vps58358 sshd\[12835\]: Invalid user password from 180.76.177.194Apr 24 23:36:14 vps58358 sshd\[12835\]: Failed password for invalid user password from 180.76.177.194 port 49456 ssh2Apr 24 23:40:29 vps58358 sshd\[12976\]: Invalid user test1 from 180.76.177.194Apr 24 23:40:31 vps58358 sshd\[12976\]: Failed password for invalid user test1 from 180.76.177.194 port 51026 ssh2
...
2020-04-25 06:55:43
222.186.30.57 attackbots
Apr 24 19:00:56 ny01 sshd[24799]: Failed password for root from 222.186.30.57 port 14398 ssh2
Apr 24 19:01:05 ny01 sshd[24814]: Failed password for root from 222.186.30.57 port 53031 ssh2
2020-04-25 07:05:28
121.100.17.42 attackspambots
Apr 25 00:11:18 srv206 sshd[24604]: Invalid user oe from 121.100.17.42
...
2020-04-25 07:23:30

Recently Reported IPs

45.82.201.156 99.188.28.247 204.33.204.149 204.120.191.240
55.130.246.151 15.55.122.254 26.92.0.64 38.1.21.189
138.158.207.107 30.27.72.150 12.157.111.110 144.197.218.24
148.178.241.238 87.71.180.233 26.177.13.75 223.0.31.13
141.101.212.13 222.223.159.228 237.70.147.6 142.13.222.149