Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Pakistan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.135.38.24
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2442
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.135.38.24.			IN	A

;; AUTHORITY SECTION:
.			391	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:59:42 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 24.38.135.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 24.38.135.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
88.7.95.167 attack
Unauthorized connection attempt from IP address 88.7.95.167 on Port 445(SMB)
2019-12-28 23:12:26
146.185.180.19 attackbotsspam
Brute-force attempt banned
2019-12-28 23:06:46
198.143.155.141 attackspam
firewall-block, port(s): 2086/tcp
2019-12-28 22:39:14
103.95.40.125 attack
Portscan or hack attempt detected by psad/fwsnort
2019-12-28 23:05:14
186.67.55.209 attackspam
Unauthorized connection attempt from IP address 186.67.55.209 on Port 445(SMB)
2019-12-28 22:47:25
186.90.79.237 attack
Unauthorized connection attempt from IP address 186.90.79.237 on Port 445(SMB)
2019-12-28 22:50:48
1.161.220.98 attack
Unauthorized connection attempt from IP address 1.161.220.98 on Port 445(SMB)
2019-12-28 23:08:20
222.186.175.217 attack
Dec 28 15:33:57 vmanager6029 sshd\[11709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.217  user=root
Dec 28 15:34:00 vmanager6029 sshd\[11709\]: Failed password for root from 222.186.175.217 port 27872 ssh2
Dec 28 15:34:03 vmanager6029 sshd\[11709\]: Failed password for root from 222.186.175.217 port 27872 ssh2
2019-12-28 22:40:06
45.136.108.85 attackbots
web-1 [ssh] SSH Attack
2019-12-28 23:04:13
197.52.101.192 attack
Unauthorized connection attempt from IP address 197.52.101.192 on Port 445(SMB)
2019-12-28 23:06:18
164.132.53.185 attackspambots
" "
2019-12-28 23:00:16
222.124.158.12 attackspam
Unauthorized connection attempt from IP address 222.124.158.12 on Port 445(SMB)
2019-12-28 23:17:33
61.221.84.14 attackspambots
srv.marc-hoffrichter.de:80 61.221.84.14 - - [28/Dec/2019:15:30:07 +0100] "GET / HTTP/1.1" 400 0 "-" "-"
srv.marc-hoffrichter.de:80 61.221.84.14 - - [28/Dec/2019:15:30:29 +0100] "GET / HTTP/1.1" 400 0 "-" "-"
2019-12-28 23:10:01
193.29.13.20 attackbots
firewall-block, port(s): 4001/tcp
2019-12-28 22:55:08
182.76.204.234 attackbotsspam
Unauthorized connection attempt from IP address 182.76.204.234 on Port 445(SMB)
2019-12-28 22:55:43

Recently Reported IPs

139.133.1.4 139.131.82.36 139.138.144.22 139.138.50.100
139.135.128.214 120.78.78.86 139.138.148.148 139.146.132.162
139.140.238.112 139.141.103.49 139.146.133.245 139.146.138.211
139.146.167.17 139.146.145.175 139.15.185.62 139.147.15.218
139.15.178.23 139.150.249.134 139.150.249.4 139.15.248.16