Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.13.247.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23084
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.13.247.40.			IN	A

;; AUTHORITY SECTION:
.			491	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040701 1800 900 604800 86400

;; Query time: 78 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 07 22:56:11 CST 2022
;; MSG SIZE  rcvd: 106
Host info
b'Host 40.247.13.138.in-addr.arpa. not found: 3(NXDOMAIN)
'
Nslookup info:
server can't find 138.13.247.40.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
185.105.118.188 attack
Automatic report - Port Scan Attack
2020-03-20 16:14:57
154.160.66.42 attackspambots
Invalid user mongodb from 154.160.66.42 port 34116
2020-03-20 16:32:57
74.199.108.162 attackbotsspam
Invalid user system from 74.199.108.162 port 50598
2020-03-20 16:35:40
186.241.119.202 attackbots
firewall-block, port(s): 26/tcp
2020-03-20 16:41:18
51.254.32.102 attack
$f2bV_matches
2020-03-20 16:15:27
47.107.170.80 attack
WordPress login Brute force / Web App Attack on client site.
2020-03-20 16:40:52
121.229.59.100 attackspam
2020-03-20T07:03:05.968370homeassistant sshd[6556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.229.59.100  user=root
2020-03-20T07:03:08.197234homeassistant sshd[6556]: Failed password for root from 121.229.59.100 port 50086 ssh2
...
2020-03-20 16:18:19
178.128.150.158 attackbotsspam
Invalid user deploy from 178.128.150.158 port 40164
2020-03-20 16:32:22
167.114.3.105 attackspam
Mar 20 10:06:58 hosting sshd[12344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=105.ip-167-114-3.net  user=root
Mar 20 10:07:01 hosting sshd[12344]: Failed password for root from 167.114.3.105 port 57020 ssh2
...
2020-03-20 16:00:10
120.70.100.2 attack
Invalid user admin from 120.70.100.2 port 53270
2020-03-20 16:07:46
185.51.39.181 attackspambots
Automatic report - Port Scan Attack
2020-03-20 16:08:48
122.224.131.116 attackspambots
$f2bV_matches
2020-03-20 16:37:26
144.217.169.88 attackbotsspam
Mar 20 07:00:08 lnxweb61 sshd[24299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.169.88
Mar 20 07:00:11 lnxweb61 sshd[24299]: Failed password for invalid user confluence from 144.217.169.88 port 47876 ssh2
Mar 20 07:04:35 lnxweb61 sshd[27792]: Failed password for root from 144.217.169.88 port 51022 ssh2
2020-03-20 15:56:21
180.76.60.102 attackspam
Mar 20 05:39:41 vps647732 sshd[18330]: Failed password for root from 180.76.60.102 port 40384 ssh2
...
2020-03-20 16:04:35
180.76.176.174 attackbots
Mar 20 01:59:59 firewall sshd[16503]: Invalid user x-bot from 180.76.176.174
Mar 20 02:00:01 firewall sshd[16503]: Failed password for invalid user x-bot from 180.76.176.174 port 48598 ssh2
Mar 20 02:00:41 firewall sshd[16525]: Invalid user x-bot from 180.76.176.174
...
2020-03-20 16:16:15

Recently Reported IPs

77.37.116.208 128.244.163.102 221.186.14.99 138.233.30.29
46.3.197.203 225.179.165.205 75.133.249.49 3.136.212.253
78.240.89.253 113.160.200.198 92.44.46.144 113.160.220.152
2001:b000:168::1 2001:b000:168::2 50.105.135.59 46.117.175.1
233.159.55.200 15.198.152.196 224.78.230.103 81.59.225.77