Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Pirapora

Region: Minas Gerais

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       138.122.0.0 - 138.122.255.255
CIDR:           138.122.0.0/16
NetName:        LACNIC-ERX-138-122-0-0
NetHandle:      NET-138-122-0-0-1
Parent:         NET138 (NET-138-0-0-0-0)
NetType:        Transferred to LACNIC
OriginAS:       
Organization:   Latin American and Caribbean IP address Regional Registry (LACNIC)
RegDate:        2010-11-19
Updated:        2010-11-19
Comment:        This IP address range is under LACNIC responsibility
Comment:        for further allocations to users in LACNIC region.
Comment:        Please see http://www.lacnic.net/ for further details,
Comment:        or check the WHOIS server located at http://whois.lacnic.net
Ref:            https://rdap.arin.net/registry/ip/138.122.0.0

ResourceLink:  http://lacnic.net/cgi-bin/lacnic/whois
ResourceLink:  whois.lacnic.net


OrgName:        Latin American and Caribbean IP address Regional Registry
OrgId:          LACNIC
Address:        Rambla Republica de Mexico 6125
City:           Montevideo
StateProv:      
PostalCode:     11400
Country:        UY
RegDate:        2002-07-27
Updated:        2018-03-15
Ref:            https://rdap.arin.net/registry/entity/LACNIC

ReferralServer:  whois://whois.lacnic.net
ResourceLink:  http://lacnic.net/cgi-bin/lacnic/whois

OrgTechHandle: LACNIC-ARIN
OrgTechName:   LACNIC Whois Info
OrgTechPhone:  +598-2604-2222 
OrgTechEmail:  whois-contact@lacnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/LACNIC-ARIN

OrgAbuseHandle: LWI100-ARIN
OrgAbuseName:   LACNIC Whois Info
OrgAbusePhone:  +598-2604-2222 
OrgAbuseEmail:  abuse@lacnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/LWI100-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.lacnic.net.

% IP Client: 124.223.158.242
 % Copyright (c) Nic.br - Use of this data is governed by the Use and
% Privacy Policy at https://registro.br/upp . Distribution,
% commercialization, reproduction, and use for advertising or similar
% purposes are expressly prohibited.
% 2026-01-30T17:00:20-03:00 - 124.223.158.242

inetnum:     138.122.52.0/22
aut-num:     AS264318
abuse-c:     JASLT5
owner:       WM TELECOM BOCAIUVA LTDA. - ME
ownerid:     15.242.367/0001-99
responsible: HELDER MENDES CORREIA MACHADO
owner-c:     JASLT5
tech-c:      JASLT5
inetrev:     138.122.52.0/22
nserver:     ns1.vianorte.tv.br [lame - not published]
nsstat:      20260130 UH
nslastaa:    20180731
nserver:     ns2.vianorte.tv.br [lame - not published]
nsstat:      20260130 UH
nslastaa:    20180731
created:     20150623
changed:     20161006

nic-hdl-br:  JASLT5
person:      JANAJ� SERVI�OS LTDA
created:     20120123
changed:     20250820

% Security and mail abuse issues should also be addressed to cert.br,
% respectivelly to cert@cert.br and mail-abuse@cert.br
%
% whois.registro.br only accepts exact match queries for domains,
% registrants, contacts, tickets, providers, IPs, and ASNs.
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.122.53.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37665
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.122.53.140.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026013001 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 31 04:00:20 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 140.53.122.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 140.53.122.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
41.225.138.239 attack
Email rejected due to spam filtering
2020-04-05 23:39:58
222.186.31.135 attackspambots
Apr  5 15:08:48 localhost sshd[7259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.135  user=root
Apr  5 15:08:50 localhost sshd[7259]: Failed password for root from 222.186.31.135 port 14488 ssh2
Apr  5 15:08:53 localhost sshd[7259]: Failed password for root from 222.186.31.135 port 14488 ssh2
Apr  5 15:08:48 localhost sshd[7259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.135  user=root
Apr  5 15:08:50 localhost sshd[7259]: Failed password for root from 222.186.31.135 port 14488 ssh2
Apr  5 15:08:53 localhost sshd[7259]: Failed password for root from 222.186.31.135 port 14488 ssh2
Apr  5 15:08:48 localhost sshd[7259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.135  user=root
Apr  5 15:08:50 localhost sshd[7259]: Failed password for root from 222.186.31.135 port 14488 ssh2
Apr  5 15:08:53 localhost sshd[7259]: Failed pass
...
2020-04-05 23:20:14
109.159.184.181 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-05 22:45:19
196.43.178.1 attack
Apr  5 16:30:14 ns381471 sshd[32657]: Failed password for root from 196.43.178.1 port 40892 ssh2
2020-04-05 22:55:10
116.111.173.51 attackspambots
Automatic report - Port Scan Attack
2020-04-05 23:29:21
122.51.77.128 attackspambots
Apr  5 13:27:57 raspberrypi sshd\[22817\]: Failed password for root from 122.51.77.128 port 45740 ssh2Apr  5 13:31:07 raspberrypi sshd\[24774\]: Failed password for root from 122.51.77.128 port 51620 ssh2Apr  5 13:32:27 raspberrypi sshd\[25479\]: Failed password for root from 122.51.77.128 port 35260 ssh2
...
2020-04-05 22:51:30
83.17.166.241 attackbots
(sshd) Failed SSH login from 83.17.166.241 (PL/Poland/aqg241.internetdsl.tpnet.pl): 5 in the last 3600 secs
2020-04-05 22:49:45
104.248.138.95 attack
Brute-force attempt banned
2020-04-05 23:35:04
51.161.11.195 attackspam
SSH bruteforce
2020-04-05 23:07:19
222.186.173.215 attackbotsspam
Apr  5 16:47:47 vpn01 sshd[13819]: Failed password for root from 222.186.173.215 port 16782 ssh2
Apr  5 16:47:50 vpn01 sshd[13819]: Failed password for root from 222.186.173.215 port 16782 ssh2
...
2020-04-05 22:53:25
139.219.15.116 attackbotsspam
2020-04-05T14:38:00.939605librenms sshd[24024]: Failed password for root from 139.219.15.116 port 50772 ssh2
2020-04-05T14:43:49.983425librenms sshd[24655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.15.116  user=root
2020-04-05T14:43:51.927622librenms sshd[24655]: Failed password for root from 139.219.15.116 port 54274 ssh2
...
2020-04-05 23:01:28
122.51.242.122 attack
Apr  5 05:40:26 mockhub sshd[9132]: Failed password for root from 122.51.242.122 port 54414 ssh2
...
2020-04-05 23:11:52
2.224.168.43 attack
Apr  5 14:54:51 srv01 sshd[5994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.224.168.43  user=root
Apr  5 14:54:54 srv01 sshd[5994]: Failed password for root from 2.224.168.43 port 48286 ssh2
Apr  5 14:58:33 srv01 sshd[6217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.224.168.43  user=root
Apr  5 14:58:35 srv01 sshd[6217]: Failed password for root from 2.224.168.43 port 53716 ssh2
Apr  5 15:02:23 srv01 sshd[6485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.224.168.43  user=root
Apr  5 15:02:25 srv01 sshd[6485]: Failed password for root from 2.224.168.43 port 59150 ssh2
...
2020-04-05 23:09:46
185.156.73.60 attackspam
[MK-Root1] Blocked by UFW
2020-04-05 22:51:05
60.167.113.19 attack
$f2bV_matches
2020-04-05 23:05:32

Recently Reported IPs

47.77.237.79 138.211.209.112 107.167.18.124 13.212.26.78
35.84.144.233 116.16.126.73 20.100.196.146 208.50.73.166
121.43.118.55 204.141.243.8 3.80.46.54 216.180.246.229
56.124.15.89 54.233.41.185 36.250.220.214 1.24.16.114
123.245.85.195 47.99.44.122 56.125.174.238 18.230.218.179