Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: Flybyte Comunicacao Multimida Ltda.

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/138.99.85.8/ 
 
 BR - 1H : (161)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BR 
 NAME ASN : ASN262802 
 
 IP : 138.99.85.8 
 
 CIDR : 138.99.84.0/23 
 
 PREFIX COUNT : 10 
 
 UNIQUE IP COUNT : 5120 
 
 
 ATTACKS DETECTED ASN262802 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-11-23 07:29:13 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-23 15:31:57
Comments on same subnet:
IP Type Details Datetime
138.99.85.159 attackbots
Honeypot attack, port: 5555, PTR: 159.85.99.138.flybyte.com.br.
2020-03-30 19:57:42
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.99.85.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24650
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.99.85.8.			IN	A

;; AUTHORITY SECTION:
.			326	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019112300 1800 900 604800 86400

;; Query time: 289 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 23 15:31:52 CST 2019
;; MSG SIZE  rcvd: 115
Host info
8.85.99.138.in-addr.arpa domain name pointer 8.85.99.138.flybyte.com.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
8.85.99.138.in-addr.arpa	name = 8.85.99.138.flybyte.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
187.250.198.42 attack
Unauthorized connection attempt detected from IP address 187.250.198.42 to port 80 [J]
2020-01-19 05:02:11
62.234.157.189 attack
Unauthorized connection attempt detected from IP address 62.234.157.189 to port 80 [J]
2020-01-19 05:14:21
90.209.202.54 attackspambots
Invalid user admin from 90.209.202.54 port 57440
2020-01-19 04:50:23
95.13.74.199 attack
Unauthorized connection attempt detected from IP address 95.13.74.199 to port 4567 [J]
2020-01-19 05:11:08
177.87.158.242 attack
Unauthorized connection attempt detected from IP address 177.87.158.242 to port 80 [J]
2020-01-19 05:04:25
61.8.69.98 attack
Unauthorized connection attempt detected from IP address 61.8.69.98 to port 2220 [J]
2020-01-19 05:14:45
118.24.173.104 attackspam
SSHD brute force attack detected by fail2ban
2020-01-19 04:41:30
65.33.1.111 attack
Unauthorized connection attempt detected from IP address 65.33.1.111 to port 80 [J]
2020-01-19 05:13:53
60.51.26.10 attackbots
Unauthorized connection attempt detected from IP address 60.51.26.10 to port 8000 [J]
2020-01-19 05:15:13
111.122.181.250 attackbotsspam
Unauthorized connection attempt detected from IP address 111.122.181.250 to port 22 [T]
2020-01-19 04:44:08
113.172.143.88 attackspam
Invalid user admin from 113.172.143.88 port 56431
2020-01-19 04:43:40
118.24.99.163 attackspambots
Unauthorized connection attempt detected from IP address 118.24.99.163 to port 2220 [J]
2020-01-19 05:08:51
122.144.131.93 attackbots
Unauthorized connection attempt detected from IP address 122.144.131.93 to port 2220 [J]
2020-01-19 04:40:29
124.112.114.111 attackbotsspam
Unauthorized connection attempt detected from IP address 124.112.114.111 to port 1433 [J]
2020-01-19 05:06:27
107.189.11.11 attackspambots
Invalid user fake from 107.189.11.11 port 37830
2020-01-19 04:45:24

Recently Reported IPs

191.71.228.31 1.239.163.235 245.151.194.111 130.105.67.12
254.4.166.27 130.216.1.36 191.147.46.87 82.195.11.5
123.181.61.195 27.69.220.202 167.114.223.188 5.61.44.225
72.93.4.48 202.78.236.37 157.245.54.18 109.86.255.206
189.26.173.199 121.132.132.3 111.123.51.17 178.45.24.6