Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 38.139.101.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15077
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;38.139.101.124.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 20:54:00 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 124.101.139.38.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 124.101.139.38.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
112.221.179.133 attack
Aug 10 08:56:05 eventyay sshd[18318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.221.179.133
Aug 10 08:56:07 eventyay sshd[18318]: Failed password for invalid user aaaa from 112.221.179.133 port 45689 ssh2
Aug 10 09:00:58 eventyay sshd[19558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.221.179.133
...
2019-08-10 15:16:19
189.206.1.142 attackbotsspam
2019-08-10T07:21:03.272012abusebot-6.cloudsearch.cf sshd\[1263\]: Invalid user mz from 189.206.1.142 port 27869
2019-08-10 15:42:56
119.29.170.170 attackspambots
Aug 10 05:59:12 cp sshd[6703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.170.170
2019-08-10 15:14:50
216.244.66.233 attackbotsspam
20 attempts against mh-misbehave-ban on pluto.magehost.pro
2019-08-10 15:35:33
212.129.55.250 attackbots
[portscan] Port scan
2019-08-10 15:21:05
164.163.2.4 attackbotsspam
Aug 10 02:54:52 debian sshd\[31521\]: Invalid user master from 164.163.2.4 port 37568
Aug 10 02:54:52 debian sshd\[31521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.163.2.4
Aug 10 02:54:53 debian sshd\[31521\]: Failed password for invalid user master from 164.163.2.4 port 37568 ssh2
...
2019-08-10 15:35:05
213.254.129.133 attackbots
RDPBruteCAu
2019-08-10 15:37:29
124.239.196.154 attack
[Aegis] @ 2019-08-10 06:40:23  0100 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack
2019-08-10 15:20:41
41.42.63.106 attack
2019-08-10T04:36:01.941614centos sshd\[11800\]: Invalid user admin from 41.42.63.106 port 35751
2019-08-10T04:36:01.947737centos sshd\[11800\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.42.63.106
2019-08-10T04:36:03.703395centos sshd\[11800\]: Failed password for invalid user admin from 41.42.63.106 port 35751 ssh2
2019-08-10 15:25:23
110.185.217.188 attackbots
SMB Server BruteForce Attack
2019-08-10 15:26:48
5.200.84.131 attack
Automatic report - Port Scan Attack
2019-08-10 15:24:08
181.118.10.107 attack
Aug  9 20:36:28 mail postfix/postscreen[102742]: PREGREET 25 after 0.76 from [181.118.10.107]:59390: EHLO aspmx.l.google.com

...
2019-08-10 15:06:35
198.211.122.197 attackspam
Automatic report - Banned IP Access
2019-08-10 15:21:36
39.59.73.168 attackspam
SS5,WP GET /wp-login.php
2019-08-10 15:19:01
165.22.254.187 attackbotsspam
Reported by AbuseIPDB proxy server.
2019-08-10 15:13:00

Recently Reported IPs

221.74.197.85 88.173.151.253 154.20.207.108 85.106.65.30
213.156.13.101 97.242.11.150 235.177.168.8 97.155.207.238
34.125.209.65 96.110.240.196 244.120.74.112 89.24.78.33
18.250.76.36 197.182.219.72 35.39.228.72 150.42.62.205
118.161.9.234 82.152.103.111 171.234.164.96 58.165.54.216