Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 39.21.11.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63682
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;39.21.11.138.			IN	A

;; AUTHORITY SECTION:
.			207	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022012600 1800 900 604800 86400

;; Query time: 142 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 26 19:04:43 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 138.11.21.39.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.11.21.39.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
190.82.113.69 attackspambots
SPAM Delivery Attempt
2019-11-05 20:16:23
111.93.184.186 attackbotsspam
Honeypot attack, port: 445, PTR: static-186.184.93.111-tataidc.co.in.
2019-11-05 20:01:53
222.186.175.150 attackspam
Nov  5 13:00:43 nextcloud sshd\[17110\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.150  user=root
Nov  5 13:00:44 nextcloud sshd\[17110\]: Failed password for root from 222.186.175.150 port 40112 ssh2
Nov  5 13:00:51 nextcloud sshd\[17110\]: Failed password for root from 222.186.175.150 port 40112 ssh2
...
2019-11-05 20:09:03
195.191.3.118 attackbotsspam
Lines containing failures of 195.191.3.118
Nov  4 19:37:45 jarvis sshd[13119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.191.3.118  user=r.r
Nov  4 19:37:47 jarvis sshd[13119]: Failed password for r.r from 195.191.3.118 port 60447 ssh2
Nov  4 19:37:47 jarvis sshd[13119]: Received disconnect from 195.191.3.118 port 60447:11: Bye Bye [preauth]
Nov  4 19:37:47 jarvis sshd[13119]: Disconnected from authenticating user r.r 195.191.3.118 port 60447 [preauth]
Nov  4 19:55:36 jarvis sshd[17087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.191.3.118  user=r.r
Nov  4 19:55:37 jarvis sshd[17087]: Failed password for r.r from 195.191.3.118 port 32929 ssh2
Nov  4 19:55:38 jarvis sshd[17087]: Received disconnect from 195.191.3.118 port 32929:11: Bye Bye [preauth]
Nov  4 19:55:38 jarvis sshd[17087]: Disconnected from authenticating user r.r 195.191.3.118 port 32929 [preauth]
Nov  4 19:59:0........
------------------------------
2019-11-05 19:56:25
186.94.120.148 attackspambots
Port 1433 Scan
2019-11-05 20:00:09
80.82.77.227 attackbots
ET DROP Dshield Block Listed Source group 1 - port: 8880 proto: TCP cat: Misc Attack
2019-11-05 19:57:46
92.118.38.38 spambotsattack
Nov  5 12:43:17 serverx postfix/smtpd[1809]: warning: unknown[92.118.38.38]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  5 12:43:17 serverx postfix/smtpd[1809]: disconnect from unknown[92.118.38.38] ehlo=1 auth=0/1 rset=1 quit=1 commands=3/4
Nov  5 12:43:25 serverx postfix/smtpd[1983]: warning: unknown[92.118.38.54]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  5 12:43:26 serverx postfix/smtpd[1983]: disconnect from unknown[92.118.38.54] ehlo=1 auth=0/1 rset=1 quit=1 commands=3/4
Nov  5 12:43:41 serverx postfix/smtpd[1809]: warning: hostname ip-38-38.ZervDNS does not resolve to address 92.118.38.38: Name or service not known
Nov  5 12:43:41 serverx postfix/smtpd[1809]: connect from unknown[92.118.38.38]
Nov  5 12:43:53 serverx postfix/smtpd[1809]: warning: unknown[92.118.38.38]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  5 12:43:53 serverx postfix/smtpd[1809]: disconnect from unknown[92.118.38.38] ehlo=1 auth=0/1 rset=1 quit=1 commands=3/4
2019-11-05 19:56:46
182.16.163.162 attackspam
Absender hat Spam-Falle ausgel?st
2019-11-05 20:19:49
45.6.93.222 attack
Nov  5 10:56:13 srv01 sshd[16894]: Invalid user fucker from 45.6.93.222
Nov  5 10:56:13 srv01 sshd[16894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.6.93.222
Nov  5 10:56:13 srv01 sshd[16894]: Invalid user fucker from 45.6.93.222
Nov  5 10:56:15 srv01 sshd[16894]: Failed password for invalid user fucker from 45.6.93.222 port 39298 ssh2
Nov  5 11:01:30 srv01 sshd[17176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.6.93.222  user=root
Nov  5 11:01:32 srv01 sshd[17176]: Failed password for root from 45.6.93.222 port 48588 ssh2
...
2019-11-05 19:47:49
200.71.237.244 attackbots
Absender hat Spam-Falle ausgel?st
2019-11-05 20:12:10
98.6.168.194 attackbots
proto=tcp  .  spt=56020  .  dpt=25  .     (Found on   Dark List de Nov 05)     (461)
2019-11-05 20:29:54
167.99.158.136 attackbots
Apr  9 20:16:08 vtv3 sshd\[30642\]: Invalid user annuaire from 167.99.158.136 port 33790
Apr  9 20:16:08 vtv3 sshd\[30642\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.158.136
Apr  9 20:16:10 vtv3 sshd\[30642\]: Failed password for invalid user annuaire from 167.99.158.136 port 33790 ssh2
Apr  9 20:22:03 vtv3 sshd\[455\]: Invalid user now from 167.99.158.136 port 41100
Apr  9 20:22:03 vtv3 sshd\[455\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.158.136
Apr 20 01:56:36 vtv3 sshd\[12596\]: Invalid user mis from 167.99.158.136 port 52252
Apr 20 01:56:36 vtv3 sshd\[12596\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.158.136
Apr 20 01:56:38 vtv3 sshd\[12596\]: Failed password for invalid user mis from 167.99.158.136 port 52252 ssh2
Apr 20 02:01:32 vtv3 sshd\[14989\]: Invalid user demo from 167.99.158.136 port 46214
Apr 20 02:01:32 vtv3 sshd\[14989\]: p
2019-11-05 19:55:23
193.112.206.73 attack
Nov  5 13:02:19 eventyay sshd[32078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.206.73
Nov  5 13:02:21 eventyay sshd[32078]: Failed password for invalid user sudoku from 193.112.206.73 port 43334 ssh2
Nov  5 13:06:37 eventyay sshd[32114]: Failed password for root from 193.112.206.73 port 45664 ssh2
...
2019-11-05 20:07:14
159.203.198.34 attackspam
Nov  5 12:32:46 legacy sshd[17210]: Failed password for root from 159.203.198.34 port 36538 ssh2
Nov  5 12:36:50 legacy sshd[17332]: Failed password for root from 159.203.198.34 port 55543 ssh2
...
2019-11-05 19:50:13
218.5.250.62 attackbots
Honeypot attack, port: 23, PTR: PTR record not found
2019-11-05 19:57:25

Recently Reported IPs

228.85.48.56 65.37.110.154 114.254.86.76 64.139.195.144
45.9.20.103 121.223.50.216 189.76.11.84 69.64.194.243
120.35.160.236 4.190.45.167 129.169.169.29 169.165.38.181
45.145.187.124 189.233.236.12 94.163.155.175 249.193.160.69
67.182.149.147 86.248.10.176 247.40.16.159 40.76.4.15