Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Maringá

Region: Parana

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.99.252.0
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12923
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.99.252.0.			IN	A

;; AUTHORITY SECTION:
.			589	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:01:51 CST 2022
;; MSG SIZE  rcvd: 105
Host info
0.252.99.138.in-addr.arpa domain name pointer 138.99.252.0.dinamico.mgp.net.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
0.252.99.138.in-addr.arpa	name = 138.99.252.0.dinamico.mgp.net.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
216.250.115.104 attackbots
plussize.fitness 216.250.115.104 \[16/Aug/2019:03:01:12 +0200\] "POST /wp-login.php HTTP/1.1" 200 5627 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
plussize.fitness 216.250.115.104 \[16/Aug/2019:03:01:14 +0200\] "POST /wp-login.php HTTP/1.1" 200 5580 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-08-16 10:38:11
198.71.224.63 attackspambots
MYH,DEF GET /old/wp-admin/
2019-08-16 11:18:48
189.76.253.219 attackbotsspam
Brute force attempt
2019-08-16 11:02:30
139.59.100.255 attack
WordPress brute force
2019-08-16 10:54:48
165.227.150.158 attackspam
Aug 16 06:00:46 yabzik sshd[14441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.150.158
Aug 16 06:00:48 yabzik sshd[14441]: Failed password for invalid user mailtest from 165.227.150.158 port 48024 ssh2
Aug 16 06:05:05 yabzik sshd[15861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.150.158
2019-08-16 11:10:39
177.124.231.28 attackbots
Aug 15 23:06:10 TORMINT sshd\[18675\]: Invalid user ubuntu from 177.124.231.28
Aug 15 23:06:10 TORMINT sshd\[18675\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.124.231.28
Aug 15 23:06:13 TORMINT sshd\[18675\]: Failed password for invalid user ubuntu from 177.124.231.28 port 49236 ssh2
...
2019-08-16 11:19:31
45.70.1.193 attackspambots
proto=tcp  .  spt=39891  .  dpt=25  .     (listed on Blocklist de  Aug 15)     (827)
2019-08-16 11:09:00
212.226.36.141 attackbots
WordPress brute force
2019-08-16 10:41:21
115.225.234.26 attackspambots
Aug 16 03:08:48 OPSO sshd\[2276\]: Invalid user ts from 115.225.234.26 port 42108
Aug 16 03:08:48 OPSO sshd\[2276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.225.234.26
Aug 16 03:08:50 OPSO sshd\[2276\]: Failed password for invalid user ts from 115.225.234.26 port 42108 ssh2
Aug 16 03:14:07 OPSO sshd\[3343\]: Invalid user test123 from 115.225.234.26 port 34112
Aug 16 03:14:07 OPSO sshd\[3343\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.225.234.26
2019-08-16 11:08:15
61.92.169.178 attackbotsspam
Aug 16 02:53:11 pkdns2 sshd\[33094\]: Invalid user userftp from 61.92.169.178Aug 16 02:53:14 pkdns2 sshd\[33094\]: Failed password for invalid user userftp from 61.92.169.178 port 60954 ssh2Aug 16 02:57:58 pkdns2 sshd\[33318\]: Invalid user photos from 61.92.169.178Aug 16 02:58:01 pkdns2 sshd\[33318\]: Failed password for invalid user photos from 61.92.169.178 port 54010 ssh2Aug 16 03:02:46 pkdns2 sshd\[33597\]: Invalid user nagios from 61.92.169.178Aug 16 03:02:47 pkdns2 sshd\[33597\]: Failed password for invalid user nagios from 61.92.169.178 port 47060 ssh2
...
2019-08-16 10:48:01
35.192.101.121 attackbotsspam
35.192.101.121 - - [16/Aug/2019:02:59:08 +0200] "POST [munged]wp-login.php HTTP/1.1" 444 0 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 0.000
2019-08-16 10:37:42
121.208.177.47 attackspambots
Aug 15 10:53:08 friendsofhawaii sshd\[4115\]: Invalid user pi from 121.208.177.47
Aug 15 10:53:08 friendsofhawaii sshd\[4117\]: Invalid user pi from 121.208.177.47
Aug 15 10:53:08 friendsofhawaii sshd\[4115\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.208.177.47
Aug 15 10:53:08 friendsofhawaii sshd\[4117\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.208.177.47
Aug 15 10:53:10 friendsofhawaii sshd\[4115\]: Failed password for invalid user pi from 121.208.177.47 port 36506 ssh2
Aug 15 10:53:10 friendsofhawaii sshd\[4117\]: Failed password for invalid user pi from 121.208.177.47 port 36508 ssh2
2019-08-16 11:06:08
213.202.100.91 attackbotsspam
WordPress brute force
2019-08-16 10:39:19
62.109.22.225 attack
Aug 15 22:39:30 localhost sshd\[1214\]: Invalid user wildan from 62.109.22.225
Aug 15 22:39:30 localhost sshd\[1214\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.109.22.225
Aug 15 22:39:32 localhost sshd\[1214\]: Failed password for invalid user wildan from 62.109.22.225 port 57528 ssh2
Aug 15 22:43:48 localhost sshd\[1420\]: Invalid user imprime from 62.109.22.225
Aug 15 22:43:48 localhost sshd\[1420\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.109.22.225
...
2019-08-16 11:05:13
178.63.11.228 attackspambots
xmlrpc attack
2019-08-16 10:46:53

Recently Reported IPs

138.99.250.67 138.99.251.234 245.133.173.171 118.201.204.212
118.201.213.90 118.201.217.2 118.201.228.158 118.201.230.192
118.201.241.97 138.99.28.110 138.99.253.94 138.99.253.93
138.99.28.120 138.99.28.108 138.99.253.79 138.99.253.71
138.99.253.65 118.201.249.84 138.99.253.85 138.99.253.89