Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
138.229.135.10 attackbotsspam
TCP src-port=35924   dst-port=25    dnsbl-sorbs abuseat-org barracuda       (Project Honey Pot rated Suspicious)   (1311)
2019-07-06 02:19:09
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.229.13.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9584
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.229.13.21.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012401 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 03:18:11 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 21.13.229.138.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 138.229.13.21.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
87.221.63.116 attack
5555/tcp
[2019-09-30]1pkt
2019-10-01 03:12:36
198.58.107.53 attack
Sep 30 12:10:43 thevastnessof sshd[2495]: Failed password for root from 198.58.107.53 port 41142 ssh2
...
2019-10-01 03:21:02
125.162.65.224 attackspambots
Honeypot attack, port: 445, PTR: 224.subnet125-162-65.speedy.telkom.net.id.
2019-10-01 03:32:03
140.213.59.171 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2019-10-01 03:19:56
132.232.118.214 attackspambots
$f2bV_matches
2019-10-01 03:14:10
23.254.215.130 attack
Postfix SMTP rejection
...
2019-10-01 02:52:02
177.10.193.214 attack
Telnet/23 MH Probe, BF, Hack -
2019-10-01 02:56:08
68.197.203.135 attackbotsspam
Automatic report - Banned IP Access
2019-10-01 02:57:01
222.186.175.216 attack
SSH Brute Force, server-1 sshd[12952]: Failed password for root from 222.186.175.216 port 24114 ssh2
2019-10-01 03:06:29
203.210.86.38 attackspambots
Fail2Ban - SSH Bruteforce Attempt
2019-10-01 03:17:39
180.76.176.113 attackspambots
2019-09-30T14:33:30.6947421495-001 sshd\[64229\]: Invalid user tan from 180.76.176.113 port 34292
2019-09-30T14:33:30.7018451495-001 sshd\[64229\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.176.113
2019-09-30T14:33:32.5128951495-001 sshd\[64229\]: Failed password for invalid user tan from 180.76.176.113 port 34292 ssh2
2019-09-30T14:37:44.2448691495-001 sshd\[64498\]: Invalid user SiateL0167 from 180.76.176.113 port 39670
2019-09-30T14:37:44.2538341495-001 sshd\[64498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.176.113
2019-09-30T14:37:45.9343991495-001 sshd\[64498\]: Failed password for invalid user SiateL0167 from 180.76.176.113 port 39670 ssh2
...
2019-10-01 02:50:44
190.144.135.118 attackbots
Sep 28 20:23:25 mail sshd[7698]: Invalid user josefina from 190.144.135.118
Sep 28 20:23:25 mail sshd[7698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.144.135.118
Sep 28 20:23:25 mail sshd[7698]: Invalid user josefina from 190.144.135.118
Sep 28 20:23:27 mail sshd[7698]: Failed password for invalid user josefina from 190.144.135.118 port 59800 ssh2
...
2019-10-01 03:02:05
114.141.34.154 attack
DATE:2019-09-30 14:11:17, IP:114.141.34.154, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-10-01 03:09:50
157.230.63.232 attackspam
Automatic report - Banned IP Access
2019-10-01 03:13:44
216.244.66.232 attack
Automated report (2019-09-30T16:18:45+00:00). Misbehaving bot detected at this address.
2019-10-01 02:47:06

Recently Reported IPs

123.184.22.219 70.64.111.166 34.245.124.104 217.3.192.202
58.250.182.203 191.44.89.179 74.3.114.66 157.172.79.174
117.68.3.244 81.160.118.173 66.254.172.16 122.15.109.140
35.0.120.238 142.145.121.209 80.211.124.210 144.145.48.152
51.206.27.26 187.187.36.121 224.99.132.107 160.82.79.73