Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Campo do Meio

Region: Minas Gerais

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: Net Mais Telecomunicações Eireli - ME

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.36.130.10
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35996
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.36.130.10.			IN	A

;; AUTHORITY SECTION:
.			3367	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019033000 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sun Mar 31 01:51:27 +08 2019
;; MSG SIZE  rcvd: 117

Host info
10.130.36.138.in-addr.arpa domain name pointer netmaismg-138-36-130-10.netmaismg.com.br.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
10.130.36.138.in-addr.arpa	name = netmaismg-138-36-130-10.netmaismg.com.br.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
80.211.67.90 attackbotsspam
Nov 20 07:01:32 php1 sshd\[19721\]: Invalid user soderberg from 80.211.67.90
Nov 20 07:01:32 php1 sshd\[19721\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.67.90
Nov 20 07:01:34 php1 sshd\[19721\]: Failed password for invalid user soderberg from 80.211.67.90 port 49250 ssh2
Nov 20 07:05:29 php1 sshd\[20066\]: Invalid user continue from 80.211.67.90
Nov 20 07:05:29 php1 sshd\[20066\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.67.90
2019-11-21 01:08:34
23.228.101.195 attackbots
port scans
2019-11-21 01:07:39
27.254.90.106 attackspambots
Nov 20 18:15:16 markkoudstaal sshd[20399]: Failed password for root from 27.254.90.106 port 37985 ssh2
Nov 20 18:19:42 markkoudstaal sshd[20782]: Failed password for root from 27.254.90.106 port 56124 ssh2
2019-11-21 01:28:09
200.85.48.30 attack
Invalid user jpg from 200.85.48.30 port 57196
2019-11-21 01:23:02
121.57.224.91 attack
Unauthorised access (Nov 20) SRC=121.57.224.91 LEN=60 TTL=47 ID=8378 DF TCP DPT=8080 WINDOW=14100 SYN
2019-11-21 01:23:46
185.45.22.133 attack
PHI,WP GET /wp-login.php
2019-11-21 01:44:07
77.40.40.140 attackspam
Nov 20 17:51:39 mail postfix/smtps/smtpd[9684]: warning: unknown[77.40.40.140]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 20 17:51:46 mail postfix/smtpd[12435]: warning: unknown[77.40.40.140]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 20 17:55:07 mail postfix/smtpd[12423]: warning: unknown[77.40.40.140]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-21 01:35:05
94.23.204.136 attackbotsspam
2019-11-20T16:31:08.286705scmdmz1 sshd\[3854\]: Invalid user info from 94.23.204.136 port 38168
2019-11-20T16:31:08.289330scmdmz1 sshd\[3854\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns364702.ip-94-23-204.eu
2019-11-20T16:31:10.041590scmdmz1 sshd\[3854\]: Failed password for invalid user info from 94.23.204.136 port 38168 ssh2
...
2019-11-21 01:19:41
178.72.162.243 attackbotsspam
Unauthorised access (Nov 20) SRC=178.72.162.243 LEN=40 TTL=241 ID=30132 TCP DPT=1433 WINDOW=1024 SYN
2019-11-21 01:24:53
187.109.166.169 attack
Brute force attempt
2019-11-21 01:23:18
200.110.172.2 attackbots
Nov 20 18:02:10 localhost sshd\[29907\]: Invalid user shani from 200.110.172.2 port 37789
Nov 20 18:02:10 localhost sshd\[29907\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.110.172.2
Nov 20 18:02:12 localhost sshd\[29907\]: Failed password for invalid user shani from 200.110.172.2 port 37789 ssh2
2019-11-21 01:04:46
79.140.3.69 attack
2019-11-20 15:06:23 H=79-140-3-69.broadband.tenet.odessa.ua [79.140.3.69]:13582 I=[10.100.18.22]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=79.140.3.69)
2019-11-20 15:06:23 unexpected disconnection while reading SMTP command from 79-140-3-69.broadband.tenet.odessa.ua [79.140.3.69]:13582 I=[10.100.18.22]:25 (error: Connection reset by peer)
2019-11-20 15:36:15 H=79-140-3-69.broadband.tenet.odessa.ua [79.140.3.69]:20736 I=[10.100.18.22]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=79.140.3.69)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=79.140.3.69
2019-11-21 01:29:17
84.17.47.44 attackspambots
(From rodgerTew@outlook.com) Local Business Citations are powerful ranking tools for any local business. But Not All Business Citations are created equal. Get Top Local Citations for your business that will help you get higher Local Rank and also increase your local visibility in your area. You will get 1500 Quality Back Links from citation sites to increase the position of your business in local search. 
 
More info: 
https://www.monkeydigital.co/product/google-maps-citations/ 
 
thanks and regards 
Monkey Digital Team 
support@monkeydigital.co
2019-11-21 01:27:42
166.62.85.53 attackspambots
xmlrpc attack
2019-11-21 01:44:28
106.51.80.198 attackbotsspam
Nov 20 23:02:20 vibhu-HP-Z238-Microtower-Workstation sshd\[14400\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.80.198  user=root
Nov 20 23:02:22 vibhu-HP-Z238-Microtower-Workstation sshd\[14400\]: Failed password for root from 106.51.80.198 port 47806 ssh2
Nov 20 23:06:26 vibhu-HP-Z238-Microtower-Workstation sshd\[15347\]: Invalid user borg from 106.51.80.198
Nov 20 23:06:26 vibhu-HP-Z238-Microtower-Workstation sshd\[15347\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.80.198
Nov 20 23:06:28 vibhu-HP-Z238-Microtower-Workstation sshd\[15347\]: Failed password for invalid user borg from 106.51.80.198 port 54546 ssh2
...
2019-11-21 01:36:41

Recently Reported IPs

186.214.152.37 159.65.34.82 210.186.108.211 203.89.29.118
118.25.40.16 80.211.253.94 36.66.95.85 24.232.42.190
187.122.255.21 5.135.181.11 185.53.88.159 184.82.11.46
186.151.174.142 1.55.223.210 117.247.195.110 204.48.22.221
162.243.140.155 37.29.40.129 106.198.239.36 103.78.182.27