Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
138.122.39.240 attackbots
Unauthorized SMTP/IMAP/POP3 connection attempt
2019-08-19 09:15:10
138.122.39.217 attackbotsspam
libpam_shield report: forced login attempt
2019-08-07 08:11:24
138.122.39.121 attackspam
Brute force attempt
2019-07-08 04:40:54
138.122.39.189 attack
Brute force SMTP login attempts.
2019-06-25 19:38:01
138.122.39.122 attackspam
failed_logins
2019-06-25 18:15:21
138.122.39.5 attackbotsspam
Unauthorized SMTP/IMAP/POP3 connection attempt
2019-06-24 01:55:18
138.122.39.172 attackspambots
SMTP-sasl brute force
...
2019-06-22 10:06:11
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.122.39.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52756
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.122.39.197.			IN	A

;; AUTHORITY SECTION:
.			458	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 87 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 12:26:13 CST 2022
;; MSG SIZE  rcvd: 107
Host info
197.39.122.138.in-addr.arpa domain name pointer 138-122-39-197.provedorm4net.com.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
197.39.122.138.in-addr.arpa	name = 138-122-39-197.provedorm4net.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
121.227.110.212 attackbotsspam
Unauthorized connection attempt detected from IP address 121.227.110.212 to port 1433
2020-03-31 13:28:24
186.185.231.18 attackbots
IP address logged by my Netflix account after the individual hacked into and locked me out of my account. Individual also changed my account settings to the most expensive plan, which allows multiple people (profiles) to watch, and several profiles were added. The name on my account was changed to "Juan". I contacted Netflix to have my account restored, so I was able to see the various IP addresses used. I will report all of them as well.
2020-03-31 13:51:29
178.142.123.100 attackbots
Mar 31 05:54:22 v22019038103785759 sshd\[21140\]: Invalid user pi from 178.142.123.100 port 56300
Mar 31 05:54:22 v22019038103785759 sshd\[21140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.142.123.100
Mar 31 05:54:22 v22019038103785759 sshd\[21142\]: Invalid user pi from 178.142.123.100 port 56316
Mar 31 05:54:22 v22019038103785759 sshd\[21142\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.142.123.100
Mar 31 05:54:24 v22019038103785759 sshd\[21140\]: Failed password for invalid user pi from 178.142.123.100 port 56300 ssh2
...
2020-03-31 13:22:57
134.73.51.12 attackspam
Mar 31 05:27:16 mail.srvfarm.net postfix/smtpd[361760]: NOQUEUE: reject: RCPT from unknown[134.73.51.12]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 31 05:28:14 mail.srvfarm.net postfix/smtpd[381494]: NOQUEUE: reject: RCPT from unknown[134.73.51.12]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 31 05:33:04 mail.srvfarm.net postfix/smtpd[377289]: NOQUEUE: reject: RCPT from unknown[134.73.51.12]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 31 05:33:18 mail.srvfarm.net postfix/smtpd[365658]: NOQUEUE: reject: RCPT from unknown[134.73.51.12]: 450 4.1.8 
2020-03-31 13:36:25
45.12.161.31 attackspambots
2020-03-31T07:07:29.647899v22018076590370373 sshd[22444]: Failed password for root from 45.12.161.31 port 45796 ssh2
2020-03-31T07:11:29.597690v22018076590370373 sshd[1964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.12.161.31  user=root
2020-03-31T07:11:31.283129v22018076590370373 sshd[1964]: Failed password for root from 45.12.161.31 port 60294 ssh2
2020-03-31T07:15:56.480479v22018076590370373 sshd[26123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.12.161.31  user=root
2020-03-31T07:15:58.487007v22018076590370373 sshd[26123]: Failed password for root from 45.12.161.31 port 46560 ssh2
...
2020-03-31 13:32:59
188.131.217.33 attackbotsspam
fail2ban/Mar 31 03:47:17 h1962932 sshd[19675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.217.33  user=root
Mar 31 03:47:18 h1962932 sshd[19675]: Failed password for root from 188.131.217.33 port 54080 ssh2
Mar 31 03:50:31 h1962932 sshd[19832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.217.33  user=root
Mar 31 03:50:33 h1962932 sshd[19832]: Failed password for root from 188.131.217.33 port 55918 ssh2
Mar 31 03:53:38 h1962932 sshd[19931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.217.33  user=root
Mar 31 03:53:39 h1962932 sshd[19931]: Failed password for root from 188.131.217.33 port 57756 ssh2
2020-03-31 13:55:37
111.186.57.170 attackbots
$f2bV_matches
2020-03-31 13:22:37
123.18.101.126 attackspambots
1585626831 - 03/31/2020 05:53:51 Host: 123.18.101.126/123.18.101.126 Port: 445 TCP Blocked
2020-03-31 13:47:18
200.120.95.12 attack
Mar 31 03:53:49 *** sshd[8686]: User root from 200.120.95.12 not allowed because not listed in AllowUsers
2020-03-31 13:44:43
194.152.206.93 attack
SSH bruteforce
2020-03-31 13:40:49
63.143.57.30 attackspambots
[2020-03-31 01:00:19] NOTICE[1148][C-00019528] chan_sip.c: Call from '' (63.143.57.30:5073) to extension '011972599362540' rejected because extension not found in context 'public'.
[2020-03-31 01:00:19] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-03-31T01:00:19.251-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011972599362540",SessionID="0x7fd82cdb8718",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/63.143.57.30/5073",ACLName="no_extension_match"
[2020-03-31 01:08:38] NOTICE[1148][C-00019533] chan_sip.c: Call from '' (63.143.57.30:5106) to extension '011972599362540' rejected because extension not found in context 'public'.
[2020-03-31 01:08:38] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-03-31T01:08:38.101-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011972599362540",SessionID="0x7fd82cdb8718",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/63.143
...
2020-03-31 13:25:26
51.83.44.246 attack
Mar 31 06:49:00 prox sshd[9919]: Failed password for root from 51.83.44.246 port 34046 ssh2
2020-03-31 13:38:21
157.245.202.159 attack
Mar 31 01:15:33 NPSTNNYC01T sshd[26264]: Failed password for root from 157.245.202.159 port 57548 ssh2
Mar 31 01:19:56 NPSTNNYC01T sshd[26547]: Failed password for root from 157.245.202.159 port 42316 ssh2
...
2020-03-31 13:45:13
59.48.40.34 attackspambots
(sshd) Failed SSH login from 59.48.40.34 (CN/China/34.40.48.59.broad.cz.sx.dynamic.163data.com.cn): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 31 05:53:55 ubnt-55d23 sshd[24564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.48.40.34  user=root
Mar 31 05:53:57 ubnt-55d23 sshd[24564]: Failed password for root from 59.48.40.34 port 60463 ssh2
2020-03-31 13:41:37
15.164.7.242 attackspambots
Mar 30 19:05:05 hpm sshd\[8741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-15-164-7-242.ap-northeast-2.compute.amazonaws.com  user=root
Mar 30 19:05:06 hpm sshd\[8741\]: Failed password for root from 15.164.7.242 port 38544 ssh2
Mar 30 19:09:27 hpm sshd\[9036\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-15-164-7-242.ap-northeast-2.compute.amazonaws.com  user=root
Mar 30 19:09:29 hpm sshd\[9036\]: Failed password for root from 15.164.7.242 port 51766 ssh2
Mar 30 19:13:45 hpm sshd\[9314\]: Invalid user ai from 15.164.7.242
2020-03-31 13:25:52

Recently Reported IPs

138.122.97.172 138.122.95.44 138.122.97.133 138.122.92.39
138.122.97.153 138.122.98.102 138.122.98.103 138.122.98.106
138.122.98.21 138.122.98.53 138.122.98.62 138.122.98.26
138.122.98.41 138.122.98.72 138.122.98.43 138.122.98.45
138.128.138.27 138.122.98.87 138.128.165.162 138.128.171.195