Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.99.78.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14466
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.99.78.1.			IN	A

;; AUTHORITY SECTION:
.			355	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 07:07:32 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 1.78.99.138.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 138.99.78.1.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
14.248.159.210 attackbotsspam
Brute forcing email accounts
2020-10-08 19:42:22
124.156.146.165 attackspambots
$f2bV_matches
2020-10-08 19:39:39
27.77.234.82 attackbotsspam
Port Scan detected!
...
2020-10-08 19:59:11
185.14.192.136 attackspam
SS5,Magento Bruteforce Login Attack POST /index.php/admin/
2020-10-08 20:04:39
196.251.238.47 attackbotsspam
Brute forcing email accounts
2020-10-08 19:27:46
106.12.93.25 attack
2020-10-08T05:20:37.4012951495-001 sshd[51255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.93.25  user=root
2020-10-08T05:20:39.2904761495-001 sshd[51255]: Failed password for root from 106.12.93.25 port 45660 ssh2
2020-10-08T05:25:19.7330491495-001 sshd[51545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.93.25  user=root
2020-10-08T05:25:22.0014101495-001 sshd[51545]: Failed password for root from 106.12.93.25 port 45264 ssh2
2020-10-08T05:29:56.9353131495-001 sshd[51766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.93.25  user=root
2020-10-08T05:29:59.2307791495-001 sshd[51766]: Failed password for root from 106.12.93.25 port 44852 ssh2
...
2020-10-08 19:25:21
223.25.247.81 attackbotsspam
Fail2Ban Ban Triggered
2020-10-08 20:00:39
112.85.42.120 attackbotsspam
Oct  8 13:43:14 sso sshd[8680]: Failed password for root from 112.85.42.120 port 40502 ssh2
Oct  8 13:43:24 sso sshd[8680]: Failed password for root from 112.85.42.120 port 40502 ssh2
...
2020-10-08 20:05:08
191.235.110.78 attack
Found on   CINS badguys     / proto=6  .  srcport=11347  .  dstport=23 Telnet  .     (783)
2020-10-08 19:49:25
103.141.144.137 attackbots
Automatic report - Banned IP Access
2020-10-08 20:03:01
109.244.96.201 attackbotsspam
Found on   CINS badguys     / proto=6  .  srcport=42041  .  dstport=8678  .     (697)
2020-10-08 19:44:46
115.72.130.195 attackspam
Automatic report - Banned IP Access
2020-10-08 19:30:56
171.246.61.140 attack
Unauthorized connection attempt detected from IP address 171.246.61.140 to port 23 [T]
2020-10-08 20:02:38
119.195.180.227 attackspambots
6881/udp 30301/udp 30301/udp
[2020-09-29/10-07]3pkt
2020-10-08 19:37:06
180.76.186.109 attackbots
$f2bV_matches
2020-10-08 19:49:01

Recently Reported IPs

139.155.15.173 139.155.94.186 139.159.231.160 139.162.14.9
139.162.174.210 139.162.72.64 139.170.10.249 139.162.231.136
139.170.232.73 139.177.197.165 139.178.70.214 139.189.208.167
139.180.208.18 139.189.209.106 139.190.145.198 139.190.149.57
139.190.239.181 139.190.138.86 139.190.239.76 139.190.239.77