Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bethlehem

Region: Pennsylvania

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: PenTeleData Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 24.229.138.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28821
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;24.229.138.143.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019080101 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Aug 02 01:35:05 CST 2019
;; MSG SIZE  rcvd: 118
Host info
143.138.229.24.in-addr.arpa domain name pointer 24.229.138.143.res-cmts.ave.ptd.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
143.138.229.24.in-addr.arpa	name = 24.229.138.143.res-cmts.ave.ptd.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.6.198.47 attack
xmlrpc attack
2019-07-13 11:51:34
189.86.186.122 attack
Unauthorized connection attempt from IP address 189.86.186.122 on Port 445(SMB)
2019-07-13 11:41:35
176.175.111.67 attackspambots
SSH Bruteforce
2019-07-13 12:16:09
211.229.236.149 attack
SpamReport
2019-07-13 11:58:22
171.226.41.173 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-12 15:19:52,379 INFO [shellcode_manager] (171.226.41.173) no match, writing hexdump (9e5b18e2fb77b556c4173e875f3d304f :1875012) - MS17010 (EternalBlue)
2019-07-13 12:17:28
85.201.213.223 attackbots
Jul 13 05:45:34 s64-1 sshd[20336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.201.213.223
Jul 13 05:45:36 s64-1 sshd[20336]: Failed password for invalid user test2 from 85.201.213.223 port 63743 ssh2
Jul 13 05:51:09 s64-1 sshd[20395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.201.213.223
...
2019-07-13 12:10:15
110.172.132.93 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-12 16:01:53,332 INFO [shellcode_manager] (110.172.132.93) no match, writing hexdump (a949d65a999c6f0210b61efa66fecd38 :2099319) - MS17010 (EternalBlue)
2019-07-13 11:38:01
104.236.186.24 attackbots
Invalid user alice from 104.236.186.24
2019-07-13 11:47:35
58.242.164.10 attack
'IP reached maximum auth failures for a one day block'
2019-07-13 12:35:51
103.103.181.19 attackbots
Invalid user prueba from 103.103.181.19
2019-07-13 12:23:11
109.121.163.75 attack
WordPress brute force
2019-07-13 11:41:15
60.174.192.240 attackspambots
IMAP
2019-07-13 12:28:13
54.37.120.112 attack
Jul 12 20:16:36 XXX sshd[57725]: Invalid user ark from 54.37.120.112 port 52020
2019-07-13 12:13:27
77.247.109.72 attack
[2019-07-12 17:48:50] NOTICE[4215] chan_sip.c: Registration from '"221" ' failed for '77.247.109.72:5450' - Wrong password
[2019-07-12 17:48:50] SECURITY[4222] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-07-12T17:48:50.276-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="221",SessionID="0x7fdee4002700",LocalAddress="IPV4/UDP/142.93.153.17/5060",RemoteAddress="IPV4/UDP/77.247.109.72/5450",Challenge="7460e819",ReceivedChallenge="7460e819",ReceivedHash="23f1616d3c2a7aa24494275f28811213"
[2019-07-12 17:48:50] NOTICE[4215] chan_sip.c: Registration from '"221" ' failed for '77.247.109.72:5450' - Wrong password
[2019-07-12 17:48:50] SECURITY[4222] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-07-12T17:48:50.391-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="221",SessionID="0x7fdee4016e50",LocalAddress="IPV4/UDP/142.93.153.17/5060",RemoteAddress="IPV4/UDP/77.247.109.72/5450",Challenge="1a7d5512",R
2019-07-13 12:19:22
193.188.22.12 attackbots
SSH-BruteForce
2019-07-13 11:40:26

Recently Reported IPs

78.0.219.214 42.34.133.23 123.53.78.252 112.3.137.139
146.211.91.44 145.0.31.208 36.235.4.78 98.65.19.30
98.184.216.48 199.155.129.133 173.70.207.202 62.203.148.70
82.21.159.46 78.34.134.107 199.121.179.140 189.194.131.150
114.32.127.78 187.1.27.245 76.157.174.195 57.221.149.137