Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
138.204.135.116 attack
port scan and connect, tcp 80 (http)
2020-03-24 00:11:28
138.204.135.98 attackbotsspam
Unauthorized connection attempt detected from IP address 138.204.135.98 to port 80 [J]
2020-01-29 08:15:01
138.204.135.98 attackspam
Unauthorized connection attempt detected from IP address 138.204.135.98 to port 8080 [J]
2020-01-18 17:42:34
138.204.135.199 attackbots
Aug  8 02:15:11   TCP Attack: SRC=138.204.135.199 DST=[Masked] LEN=238 TOS=0x00 PREC=0x00 TTL=48  DF PROTO=TCP SPT=26716 DPT=80 WINDOW=1800 RES=0x00 ACK PSH URGP=0
2019-08-08 17:09:07
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.204.135.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2876
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.204.135.94.			IN	A

;; AUTHORITY SECTION:
.			466	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021100 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 12 00:00:12 CST 2022
;; MSG SIZE  rcvd: 107
Host info
94.135.204.138.in-addr.arpa domain name pointer 94.135.204.138.venonconnect.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
94.135.204.138.in-addr.arpa	name = 94.135.204.138.venonconnect.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
165.227.150.158 attackbots
Repeated brute force against a port
2019-08-28 07:23:41
223.144.134.191 attackspambots
" "
2019-08-28 07:57:30
186.93.12.123 attack
Unauthorized connection attempt from IP address 186.93.12.123 on Port 445(SMB)
2019-08-28 07:27:53
209.85.215.193 attackbotsspam
Spam email from rudrapratapsing770@gmail.com spoofed from Om Kumar 
2019-08-28 07:31:38
107.170.195.219 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-28 07:47:31
123.206.80.193 attackbotsspam
Automatic report - Banned IP Access
2019-08-28 07:52:00
111.198.22.130 attackbots
161 failed attempt(s) in the last 24h
2019-08-28 07:53:48
217.141.88.34 attackbots
SSH scan ::
2019-08-28 08:00:34
180.104.4.7 attackspambots
Brute force SMTP login attempts.
2019-08-28 07:44:53
12.218.23.62 attackspam
Unauthorized connection attempt from IP address 12.218.23.62 on Port 445(SMB)
2019-08-28 07:51:13
207.244.70.35 attackbots
" "
2019-08-28 07:52:30
62.210.86.79 attack
C1,WP GET /suche/wp-login.php
2019-08-28 07:20:42
138.186.176.27 attack
Unauthorized connection attempt from IP address 138.186.176.27 on Port 445(SMB)
2019-08-28 07:49:05
142.0.139.129 attackspam
Unauthorised access (Aug 27) SRC=142.0.139.129 LEN=40 TTL=241 ID=15323 TCP DPT=445 WINDOW=1024 SYN
2019-08-28 08:03:07
142.93.33.62 attackbotsspam
Aug 27 21:43:35 mail sshd\[18427\]: Invalid user huruya from 142.93.33.62 port 59876
Aug 27 21:43:35 mail sshd\[18427\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.33.62
...
2019-08-28 07:28:16

Recently Reported IPs

138.186.12.137 138.199.59.163 138.219.96.40 138.255.12.115
138.68.81.176 138.204.135.95 138.219.111.181 138.36.20.219
138.59.140.78 138.75.19.99 138.99.248.112 138.255.199.3
138.59.51.67 138.68.143.128 139.162.36.36 139.196.46.217
138.99.63.252 139.162.138.86 138.97.41.10 139.208.167.239