Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Saudi Arabia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.64.54.38
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64788
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.64.54.38.			IN	A

;; AUTHORITY SECTION:
.			216	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 17:38:18 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 38.54.64.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 38.54.64.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
129.204.201.27 attack
Nov 17 11:05:20 vps691689 sshd[792]: Failed password for root from 129.204.201.27 port 36804 ssh2
Nov 17 11:10:09 vps691689 sshd[952]: Failed password for root from 129.204.201.27 port 52770 ssh2
...
2019-11-17 18:10:27
63.81.87.144 attack
Nov 17 07:23:10  exim[8994]: 2019-11-17 07:23:10 1iWDxk-0002L4-5c H=summit.jcnovel.com (summit.hislult.com) [63.81.87.144] F= rejected after DATA: This message scored 103.2 spam points.
2019-11-17 18:42:53
185.254.120.45 attackspam
$f2bV_matches_ltvn
2019-11-17 18:09:40
62.234.124.102 attack
SSH bruteforce (Triggered fail2ban)
2019-11-17 18:22:26
139.198.18.120 attack
Nov 17 14:37:47 gw1 sshd[19253]: Failed password for root from 139.198.18.120 port 59242 ssh2
...
2019-11-17 18:19:09
121.78.129.147 attack
SSH brutforce
2019-11-17 18:35:08
182.61.46.62 attackbots
Nov 17 10:32:54 Ubuntu-1404-trusty-64-minimal sshd\[18877\]: Invalid user akiyo from 182.61.46.62
Nov 17 10:32:54 Ubuntu-1404-trusty-64-minimal sshd\[18877\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.46.62
Nov 17 10:32:56 Ubuntu-1404-trusty-64-minimal sshd\[18877\]: Failed password for invalid user akiyo from 182.61.46.62 port 37238 ssh2
Nov 17 10:50:52 Ubuntu-1404-trusty-64-minimal sshd\[3064\]: Invalid user wilhelms from 182.61.46.62
Nov 17 10:50:52 Ubuntu-1404-trusty-64-minimal sshd\[3064\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.46.62
2019-11-17 18:04:31
49.235.216.174 attack
Nov 17 12:41:53 server sshd\[24339\]: Invalid user anzu from 49.235.216.174
Nov 17 12:41:53 server sshd\[24339\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.216.174 
Nov 17 12:41:55 server sshd\[24339\]: Failed password for invalid user anzu from 49.235.216.174 port 58884 ssh2
Nov 17 12:53:57 server sshd\[27101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.216.174  user=root
Nov 17 12:53:59 server sshd\[27101\]: Failed password for root from 49.235.216.174 port 39600 ssh2
...
2019-11-17 18:20:36
178.128.233.118 attackbotsspam
\[Sun Nov 17 10:49:12.041643 2019\] \[authz_core:error\] \[pid 1854\] \[client 178.128.233.118:38002\] AH01630: client denied by server configuration: /var/www/michele/xmlrpc.php
...
2019-11-17 18:25:34
115.159.220.190 attack
Nov 17 09:15:44 nextcloud sshd\[7274\]: Invalid user rada from 115.159.220.190
Nov 17 09:15:44 nextcloud sshd\[7274\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.220.190
Nov 17 09:15:46 nextcloud sshd\[7274\]: Failed password for invalid user rada from 115.159.220.190 port 34128 ssh2
...
2019-11-17 18:14:03
190.135.50.122 attack
DATE:2019-11-17 07:24:13, IP:190.135.50.122, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-11-17 18:38:25
189.131.169.249 attackbotsspam
Unauthorised access (Nov 17) SRC=189.131.169.249 LEN=40 TTL=52 ID=58382 TCP DPT=8080 WINDOW=19047 SYN
2019-11-17 18:16:28
63.83.78.195 attack
Postfix DNSBL listed. Trying to send SPAM.
2019-11-17 18:11:23
5.249.159.139 attackspambots
Nov 17 08:25:09 sauna sshd[52902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.249.159.139
Nov 17 08:25:11 sauna sshd[52902]: Failed password for invalid user bestbusca from 5.249.159.139 port 43466 ssh2
...
2019-11-17 18:03:32
116.55.248.214 attackspambots
Nov 17 10:57:45 srv01 sshd[26483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.55.248.214  user=root
Nov 17 10:57:46 srv01 sshd[26483]: Failed password for root from 116.55.248.214 port 43768 ssh2
Nov 17 11:01:40 srv01 sshd[26748]: Invalid user myopic from 116.55.248.214
Nov 17 11:01:40 srv01 sshd[26748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.55.248.214
Nov 17 11:01:40 srv01 sshd[26748]: Invalid user myopic from 116.55.248.214
Nov 17 11:01:42 srv01 sshd[26748]: Failed password for invalid user myopic from 116.55.248.214 port 45164 ssh2
...
2019-11-17 18:13:07

Recently Reported IPs

139.60.100.48 139.60.216.71 115.200.50.216 139.99.88.22
139.99.63.202 139.99.72.46 139.99.9.38 139.99.89.153
139.99.9.228 139.99.8.24 139.99.8.234 139.99.86.124
139.99.84.41 139.99.80.151 139.99.90.139 14.0.113.172
14.0.131.15 139.99.94.241 14.0.19.194 14.0.42.22