164.138.x.x IP Lookup - Russia
IP addresses in the 164.138.0-63.x range (164.138.0.0 - 164.138.255.255 network). 2 abuse reports have been filed for IPs in this range.
- 164.138.12.147, 164.138.0.176, 164.138.31.29, 164.138.37.243, 164.138.46.58, 164.138.36.67
- 164.138.40.31, 164.138.18.89, 164.138.43.20, 164.138.0.190, 164.138.61.39, 164.138.48.162
- 164.138.63.186, 164.138.56.193, 164.138.62.236, 164.138.6.153, 164.138.39.71, 164.138.18.110
- 164.138.11.171, 164.138.58.159, 164.138.30.177, 164.138.18.7, 164.138.32.14, 164.138.39.203
- 164.138.52.130, 164.138.19.87, 164.138.52.27, 164.138.37.146, 164.138.46.135, 164.138.9.41
- 164.138.29.154, 164.138.42.90, 164.138.49.170, 164.138.35.122, 164.138.10.176, 164.138.37.81
- 164.138.29.25, 164.138.46.157, 164.138.60.17, 164.138.33.130, 164.138.4.127, 164.138.29.226
- 164.138.42.103, 164.138.42.215, 164.138.50.61, 164.138.37.191, 164.138.54.206, 164.138.56.141
- 164.138.30.233, 164.138.56.71, 164.138.50.117, 164.138.10.128, 164.138.36.218, 164.138.37.145
- 164.138.52.48, 164.138.61.252, 164.138.34.85, 164.138.41.101, 164.138.52.13, 164.138.18.207
- 164.138.55.114, 164.138.11.149, 164.138.56.40, 164.138.2.63, 164.138.33.200, 164.138.26.81
- 164.138.13.208, 164.138.47.181, 164.138.20.151, 164.138.55.64, 164.138.58.44, 164.138.22.32
- 164.138.38.255, 164.138.29.180, 164.138.44.6, 164.138.26.154, 164.138.55.212, 164.138.26.93
- 164.138.30.16, 164.138.20.82, 164.138.7.143, 164.138.29.240, 164.138.61.139, 164.138.42.34
- 164.138.48.177, 164.138.10.60, 164.138.13.2, 164.138.2.236, 164.138.31.245, 164.138.44.19
- 164.138.58.122, 164.138.47.9, 164.138.22.248, 164.138.18.203, 164.138.15.143, 164.138.55.170
- 164.138.4.5, 164.138.24.75, 164.138.5.122, 164.138.50.195, 164.138.29.248, 164.138.38.28
- 164.138.34.237, 164.138.15.133, 164.138.62.157, 164.138.33.248, 164.138.25.5, 164.138.51.128
- 164.138.41.116, 164.138.29.20, 164.138.8.133, 164.138.53.201, 164.138.49.148, 164.138.47.80
- 164.138.33.79, 164.138.58.110, 164.138.53.18, 164.138.55.35, 164.138.2.248, 164.138.52.147
- 164.138.57.64, 164.138.25.206, 164.138.59.191, 164.138.8.110, 164.138.12.255, 164.138.26.151
- 164.138.20.131, 164.138.1.171, 164.138.53.187, 164.138.52.163, 164.138.10.49, 164.138.37.236
- 164.138.52.145, 164.138.0.31, 164.138.23.45, 164.138.13.163, 164.138.55.236, 164.138.53.117
- 164.138.33.104, 164.138.59.16, 164.138.21.63, 164.138.1.231, 164.138.28.45, 164.138.39.36
- 164.138.18.165, 164.138.32.239, 164.138.47.202, 164.138.27.149, 164.138.54.48, 164.138.45.65
- 164.138.61.27, 164.138.40.9, 164.138.27.240, 164.138.32.193, 164.138.14.52, 164.138.28.192
- 164.138.34.137, 164.138.48.174, 164.138.40.21, 164.138.22.158, 164.138.42.242, 164.138.23.153
- 164.138.3.111, 164.138.11.130, 164.138.41.49, 164.138.53.16, 164.138.31.231, 164.138.30.221
- 164.138.30.108, 164.138.25.198, 164.138.21.35, 164.138.53.243, 164.138.24.111, 164.138.8.91
- 164.138.50.35, 164.138.45.68, 164.138.34.17, 164.138.52.26, 164.138.2.146, 164.138.50.17
- 164.138.63.187, 164.138.36.207, 164.138.53.83, 164.138.40.166, 164.138.5.21, 164.138.37.6
- 164.138.11.208, 164.138.25.255, 164.138.24.50, 164.138.43.82, 164.138.54.36, 164.138.20.45
- 164.138.32.183, 164.138.21.249, 164.138.34.122, 164.138.48.49, 164.138.27.76, 164.138.27.70
- 164.138.38.1, 164.138.46.117, 164.138.49.160, 164.138.23.56, 164.138.55.128, 164.138.24.188
- 164.138.17.113, 164.138.10.31, 164.138.3.249, 164.138.47.247, 164.138.43.246, 164.138.43.142
- 164.138.48.51, 164.138.28.131, 164.138.0.57, 164.138.11.176, 164.138.55.65, 164.138.26.149
- 164.138.55.104, 164.138.28.55, 164.138.58.249, 164.138.11.27, 164.138.48.210, 164.138.28.53
- 164.138.25.6, 164.138.6.43, 164.138.2.228, 164.138.0.215, 164.138.58.144, 164.138.27.34
- 164.138.15.35, 164.138.28.23, 164.138.62.244, 164.138.24.219, 164.138.35.224, 164.138.23.154
- 164.138.32.251, 164.138.23.14, 164.138.26.100, 164.138.58.207, 164.138.6.168, 164.138.33.38
- 164.138.49.173, 164.138.18.16, 164.138.22.120, 164.138.13.19, 164.138.21.28, 164.138.5.113
- 164.138.21.222, 164.138.49.90, 164.138.0.40, 164.138.7.86, 164.138.38.2, 164.138.45.118
- 164.138.58.136, 164.138.38.230, 164.138.14.171, 164.138.43.76
Showing 256 of 16,384 IPs (164.138.12.147 to 164.138.43.76). Use the pagination below to browse all IPs in this range, or look up any specific IP directly.

164.138.26.43
Complaint by Sceppie :
This IP tried to brute force attack my ubuntu linux server. The log file: Aug 6 20:07:25 LINSERV1 sshd[561]: Invalid user test from 164.138.26.43 Aug 6 20:07:25 LINSERV1 sshd[561]: pam_unix(sshd:auth): check pass; user unknown Aug 6 20:07:25 LINSERV1 sshd[561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.138.26.43 Aug 6 20:07:25 LINSERV1 sshd[560]: Invalid user web from 164.138.26.43 Aug 6 20:07:25 LINSERV1 sshd[560]: pam_unix(sshd:auth): check pass; user unknown Aug 6 20:07:25 LINSERV1 sshd[560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.138.26.43 Aug 6 20:07:25 LINSERV1 sshd[554]: Failed password for invalid user paullin from 164.138.26.43 port 54896 ssh2 Aug 6 20:07:25 LINSERV1 sshd[555]: Failed password for invalid user test from 164.138.26.43 port 54899 ssh2 Aug 6 20:07:25 LINSERV1 sshd[552]: Failed password for invalid user test from 164.138.26.43 port 54886 ssh2 Aug 6 20:07:25 LINSERV1 sshd[553]: Failed password for invalid user test from 164.138.26.43 port 54887 ssh2 Aug 6 20:07:26 LINSERV1 sshd[565]: Invalid user test from 164.138.26.43 Aug 6 20:07:26 LINSERV1 sshd[565]: pam_unix(sshd:auth): check pass; user unknown Aug 6 20:07:26 LINSERV1 sshd[565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.138.26.43 Aug 6 20:07:26 LINSERV1 sshd[567]: Invalid user test from 164.138.26.43 Aug 6 20:07:26 LINSERV1 sshd[567]: pam_unix(sshd:auth): check pass; user unknown Aug 6 20:07:26 LINSERV1 sshd[567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.138.26.43 Aug 6 20:07:26 LINSERV1 sshd[566]: Invalid user test from 164.138.26.43 Aug 6 20:07:26 LINSERV1 sshd[564]: Invalid user paullin from 164.138.26.43 Aug 6 20:07:26 LINSERV1 sshd[566]: pam_unix(sshd:auth): check pass; user unknown Aug 6 20:07:26 LINSERV1 sshd[564]: pam_unix(sshd:auth): check pass; user unknown Aug 6 20:07:26 LINSERV1 sshd[564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.138.26.43 Aug 6 20:07:26 LINSERV1 sshd[566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.138.26.43 Aug 6 20:07:27 LINSERV1 sshd[561]: Failed password for invalid user test from 164.138.26.43 port 56435 ssh2 Aug 6 20:07:27 LINSERV1 sshd[560]: Failed password for invalid user web from 164.138.26.43 port 56412 ssh2 Aug 6 20:07:28 LINSERV1 sshd[573]: Invalid user web from 164.138.26.43 Aug 6 20:07:28 LINSERV1 sshd[572]: Invalid user test1 from 164.138.26.43 Aug 6 20:07:28 LINSERV1 sshd[573]: pam_unix(sshd:auth): check pass; user unknown Aug 6 20:07:28 LINSERV1 sshd[572]: pam_unix(sshd:auth): check pass; user unknown Aug 6 20:07:28 LINSERV1 sshd[573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.138.26.43 Aug 6 20:07:28 LINSERV1 sshd[572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.138.26.43 Aug 6 20:07:29 LINSERV1 sshd[565]: Failed password for invalid user test from 164.138.26.43 port 56713 ssh2 Aug 6 20:07:29 LINSERV1 sshd[567]: Failed password for invalid user test from 164.138.26.43 port 56712 ssh2 Aug 6 20:07:29 LINSERV1 sshd[564]: Failed password for invalid user paullin from 164.138.26.43 port 56698 ssh2 Aug 6 20:07:29 LINSERV1 sshd[566]: Failed password for invalid user test from 164.138.26.43 port 56711 ssh2 Aug 6 20:07:30 LINSERV1 sshd[576]: Invalid user test from 164.138.26.43 Aug 6 20:07:30 LINSERV1 sshd[576]: pam_unix(sshd:auth): check pass; user unknown Aug 6 20:07:30 LINSERV1 sshd[576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.138.26.43 Aug 6 20:07:30 LINSERV1 sshd[577]: Invalid user test from 164.138.26.43 Aug 6 20:07:30 LINSERV1 sshd[577]: pam_unix(sshd:auth): check pass; user unknown Aug 6 20:07:30 LINSERV1 sshd[577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.138.26.43 Aug 6 20:07:30 LINSERV1 sshd[581]: Invalid user test from 164.138.26.43 Aug 6 20:07:30 LINSERV1 sshd[580]: Invalid user paullin from 164.138.26.43 Aug 6 20:07:30 LINSERV1 sshd[581]: pam_unix(sshd:auth): check pass; user unknown Aug 6 20:07:30 LINSERV1 sshd[580]: pam_unix(sshd:auth): check pass; user unknown Aug 6 20:07:30 LINSERV1 sshd[580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.138.26.43 Aug 6 20:07:30 LINSERV1 sshd[581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.138.26.43 Aug 6 20:07:30 LINSERV1 sshd[572]: Failed password for invalid user test1 from 164.138.26.43 port 58671 ssh2 Aug 6 20:07:30 LINSERV1 sshd[573]: Failed password for invalid user web from 164.138.26.43 port 58672 ssh2 Aug 6 20:07:31 LINSERV1 sshd[587]: Invalid user test1 from 164.138.26.43 Aug 6 20:07:31 LINSERV1 sshd[587]: pam_unix(sshd:auth): check pass; user unknown Aug 6 20:07:31 LINSERV1 sshd[587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.138.26.43 Aug 6 20:07:31 LINSERV1 sshd[586]: Invalid user web from 164.138.26.43 Aug 6 20:07:31 LINSERV1 sshd[586]: pam_unix(sshd:auth): check pass; user unknown Aug 6 20:07:31 LINSERV1 sshd[586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.138.26.43 Aug 6 20:07:32 LINSERV1 sshd[576]: Failed password for invalid user test from 164.138.26.43 port 59424 ssh2 Aug 6 20:07:32 LINSERV1 sshd[577]: Failed password for invalid user test from 164.138.26.43 port 59438 ssh2 Aug 6 20:07:32 LINSERV1 sshd[580]: Failed password for invalid user paullin from 164.138.26.43 port 59642 ssh2 Aug 6 20:07:32 LINSERV1 sshd[581]: Failed password for invalid user test from 164.138.26.43 port 59643 ssh2 Aug 6 20:07:33 LINSERV1 sshd[587]: Failed password for invalid user test1 from 164.138.26.43 port 60212 ssh2 Aug 6 20:07:33 LINSERV1 sshd[586]: Failed password for invalid user web from 164.138.26.43 port 60213 ssh2