Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.122.120.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44960
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.122.120.99.			IN	A

;; AUTHORITY SECTION:
.			210	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 07:23:31 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 99.120.122.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 99.120.122.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
128.134.143.33 attackbots
Unauthorized connection attempt detected from IP address 128.134.143.33 to port 2220 [J]
2020-01-04 22:13:48
222.186.31.83 attack
$f2bV_matches
2020-01-04 22:35:29
1.172.228.186 attack
23/tcp
[2020-01-04]1pkt
2020-01-04 22:39:57
119.123.224.41 attack
Unauthorized connection attempt detected from IP address 119.123.224.41 to port 23 [J]
2020-01-04 22:33:35
176.241.137.112 attackspambots
Honeypot attack, port: 23, PTR: 176-241-137-112.datagroup.ua.
2020-01-04 22:15:54
151.228.103.46 attackbotsspam
20 attempts against mh-ssh on float.magehost.pro
2020-01-04 22:30:23
222.186.175.150 attackbots
k+ssh-bruteforce
2020-01-04 21:56:25
195.9.219.74 attack
20/1/4@08:15:02: FAIL: Alarm-Network address from=195.9.219.74
...
2020-01-04 22:21:28
139.5.18.3 attack
Unauthorised access (Jan  4) SRC=139.5.18.3 LEN=52 TTL=110 ID=14868 DF TCP DPT=445 WINDOW=8192 SYN
2020-01-04 22:37:47
49.88.112.62 attackbots
Jan  4 15:07:23 MK-Soft-Root2 sshd[10246]: Failed password for root from 49.88.112.62 port 56707 ssh2
Jan  4 15:07:27 MK-Soft-Root2 sshd[10246]: Failed password for root from 49.88.112.62 port 56707 ssh2
...
2020-01-04 22:19:53
119.54.218.75 attack
Honeypot attack, port: 23, PTR: 75.218.54.119.adsl-pool.jlccptt.net.cn.
2020-01-04 22:27:50
66.70.188.152 attackspambots
_ltvn
2020-01-04 22:03:18
117.216.142.208 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-04 21:53:54
144.91.83.19 attackbots
01/04/2020-09:02:01.690295 144.91.83.19 Protocol: 17 ET SCAN Sipvicious User-Agent Detected (friendly-scanner)
2020-01-04 22:09:15
95.213.177.124 attackspam
Port scan on 1 port(s): 3128
2020-01-04 22:32:59

Recently Reported IPs

118.174.70.144 138.122.121.70 138.122.121.159 138.122.121.47
138.122.121.36 138.122.123.138 138.122.123.186 138.122.123.196
138.122.123.198 138.122.123.194 138.122.123.10 138.122.123.20
138.122.123.157 138.122.123.38 138.122.13.149 138.122.123.61
138.122.13.210 118.174.70.148 138.122.14.123 138.122.134.17