Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: New Zealand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.138.30.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36365
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;120.138.30.139.			IN	A

;; AUTHORITY SECTION:
.			494	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 10:45:06 CST 2022
;; MSG SIZE  rcvd: 107
Host info
139.30.138.120.in-addr.arpa domain name pointer rdns.120.138.30.139.sth.nz.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.30.138.120.in-addr.arpa	name = rdns.120.138.30.139.sth.nz.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.129.33.24 attackbots
 TCP (SYN) 45.129.33.24:49184 -> port 23566, len 44
2020-09-30 23:50:08
111.40.7.84 attackbots
firewall-block, port(s): 1433/tcp
2020-09-30 23:32:18
62.4.15.205 attack
SIPVicious Scanner Detection
2020-09-30 23:15:55
104.255.10.92 attack
firewall-block, port(s): 445/tcp
2020-09-30 23:32:38
193.254.245.162 attackbotsspam
ET SCAN Sipvicious Scan - port: 5060 proto: sip cat: Attempted Information Leakbytes: 455
2020-09-30 23:26:24
5.188.159.48 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 4 - port: 8443 proto: tcp cat: Misc Attackbytes: 60
2020-09-30 23:53:15
104.206.128.38 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-09-30 23:33:58
103.219.112.31 attackspam
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-30 23:34:48
112.91.154.114 attackspambots
DATE:2020-09-30 07:17:03, IP:112.91.154.114, PORT:1433 - MSSQL brute force auth on a honeypot server (epe-dc)
2020-09-30 23:31:59
89.248.167.141 attackbots
firewall-block, port(s): 3414/tcp, 5020/tcp
2020-09-30 23:41:27
46.161.27.48 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 29 - port: 4040 proto: tcp cat: Misc Attackbytes: 60
2020-09-30 23:45:19
156.96.112.211 attackspam
[29/Sep/2020:15:18:47 -0400] "GET / HTTP/1.1" Blank UA
[29/Sep/2020:16:41:19 -0400] "GET / HTTP/1.1" Blank UA
[29/Sep/2020:16:42:38 -0400] "GET / HTTP/1.1" Blank UA
2020-09-30 23:30:38
193.27.228.172 attackspambots
ET DROP Dshield Block Listed Source group 1 - port: 16098 proto: tcp cat: Misc Attackbytes: 60
2020-09-30 23:26:47
92.63.197.74 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 80 - port: 3402 proto: tcp cat: Misc Attackbytes: 60
2020-09-30 23:38:24
45.129.33.153 attackbots
ET DROP Dshield Block Listed Source group 1 - port: 16346 proto: tcp cat: Misc Attackbytes: 60
2020-09-30 23:47:33

Recently Reported IPs

120.138.30.101 120.138.19.158 120.138.30.169 120.138.30.171
120.138.8.16 120.138.19.201 120.138.8.63 120.204.77.213
120.188.80.49 120.216.168.240 120.228.93.185 120.229.157.205
120.229.22.1 120.208.71.215 120.219.121.72 120.229.132.121
120.196.90.114 120.230.106.187 120.229.239.214 120.230.49.209