Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.121.29.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10062
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.121.29.116.			IN	A

;; AUTHORITY SECTION:
.			544	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 07:22:20 CST 2022
;; MSG SIZE  rcvd: 107
Host info
b';; connection timed out; no servers could be reached
'
Nslookup info:
server can't find 138.121.29.116.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
61.164.213.198 attack
2020-05-21T05:35:38.335393ionos.janbro.de sshd[89940]: Invalid user umi from 61.164.213.198 port 59493
2020-05-21T05:35:40.382994ionos.janbro.de sshd[89940]: Failed password for invalid user umi from 61.164.213.198 port 59493 ssh2
2020-05-21T05:45:51.565178ionos.janbro.de sshd[89988]: Invalid user qki from 61.164.213.198 port 34487
2020-05-21T05:45:51.647444ionos.janbro.de sshd[89988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.164.213.198
2020-05-21T05:45:51.565178ionos.janbro.de sshd[89988]: Invalid user qki from 61.164.213.198 port 34487
2020-05-21T05:45:53.385777ionos.janbro.de sshd[89988]: Failed password for invalid user qki from 61.164.213.198 port 34487 ssh2
2020-05-21T05:50:55.942062ionos.janbro.de sshd[89993]: Invalid user wmy from 61.164.213.198 port 36100
2020-05-21T05:50:55.985608ionos.janbro.de sshd[89993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.164.213.198
2020-05-21T05:50
...
2020-05-21 14:11:23
194.26.29.212 attackbotsspam
Port scan(s) [109 denied]
2020-05-21 14:18:22
152.32.143.5 attack
IP blocked
2020-05-21 13:47:15
51.77.200.139 attackspambots
Invalid user r from 51.77.200.139 port 50462
2020-05-21 13:53:04
36.74.120.20 attack
(sshd) Failed SSH login from 36.74.120.20 (ID/Indonesia/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 21 06:03:51 amsweb01 sshd[10308]: Invalid user kxx from 36.74.120.20 port 59032
May 21 06:03:53 amsweb01 sshd[10308]: Failed password for invalid user kxx from 36.74.120.20 port 59032 ssh2
May 21 06:06:48 amsweb01 sshd[10548]: Invalid user foc from 36.74.120.20 port 41500
May 21 06:06:51 amsweb01 sshd[10548]: Failed password for invalid user foc from 36.74.120.20 port 41500 ssh2
May 21 06:09:45 amsweb01 sshd[10776]: Invalid user dyf from 36.74.120.20 port 52198
2020-05-21 14:15:39
107.182.182.88 attackspam
Invalid user fdy from 107.182.182.88 port 52904
2020-05-21 14:01:46
162.243.139.46 attackbots
port scan and connect, tcp 3128 (squid-http)
2020-05-21 14:18:49
211.24.2.134 attackbotsspam
May 21 05:56:30 * sshd[28660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.24.2.134
May 21 05:56:32 * sshd[28660]: Failed password for invalid user ubnt from 211.24.2.134 port 6745 ssh2
2020-05-21 14:16:53
36.111.181.204 attackbots
Invalid user lkq from 36.111.181.204 port 36778
2020-05-21 13:54:20
77.65.79.150 attackbots
Invalid user pany from 77.65.79.150 port 52390
2020-05-21 13:59:42
66.240.192.138 attackbots
Unauthorized connection attempt detected from IP address 66.240.192.138 to port 8099
2020-05-21 13:57:49
128.199.121.32 attackspambots
$f2bV_matches
2020-05-21 13:54:01
164.77.117.10 attack
Invalid user cnd from 164.77.117.10 port 58690
2020-05-21 14:26:27
88.26.226.48 attack
ssh brute force
2020-05-21 14:27:53
49.235.84.51 attackbotsspam
k+ssh-bruteforce
2020-05-21 14:06:33

Recently Reported IPs

138.121.28.155 138.121.29.123 118.174.69.61 138.121.29.135
138.121.29.125 118.174.69.71 138.121.29.150 138.121.29.165
138.121.29.162 138.121.29.168 138.121.29.177 138.121.29.187
138.121.29.195 138.121.29.246 138.121.29.241 138.121.29.31
118.174.69.75 138.121.3.106 138.121.29.34 138.121.29.42