Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Terbanggi Besar

Region: Lampung

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 39.246.138.152
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30823
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;39.246.138.152.			IN	A

;; AUTHORITY SECTION:
.			124	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100801 1800 900 604800 86400

;; Query time: 133 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 09 05:18:46 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 152.138.246.39.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 152.138.246.39.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.65.147.1 attack
"fail2ban match"
2020-06-04 22:48:56
159.89.174.83 attack
06/04/2020-09:49:03.992175 159.89.174.83 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-04 22:20:55
39.50.234.78 attackbotsspam
Jun  4 14:02:49 mxgate1 sshd[23358]: Did not receive identification string from 39.50.234.78 port 59232
Jun  4 14:02:53 mxgate1 sshd[23368]: Invalid user admin2 from 39.50.234.78 port 59586
Jun  4 14:02:53 mxgate1 sshd[23368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.50.234.78
Jun  4 14:02:54 mxgate1 sshd[23368]: Failed password for invalid user admin2 from 39.50.234.78 port 59586 ssh2
Jun  4 14:02:54 mxgate1 sshd[23368]: Connection closed by 39.50.234.78 port 59586 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=39.50.234.78
2020-06-04 22:20:31
123.24.104.155 attackbots
1591272455 - 06/04/2020 14:07:35 Host: 123.24.104.155/123.24.104.155 Port: 445 TCP Blocked
2020-06-04 22:29:01
183.82.1.45 attackspambots
SSH fail RA
2020-06-04 22:50:26
103.212.223.4 attackspambots
SIP connection requests
2020-06-04 22:51:57
144.91.108.185 attack
prod6
...
2020-06-04 22:49:25
85.216.239.213 attackbots
2020-06-04 14:06:45 1jgodx-0006Zf-2j SMTP connection from chello085216239213.chello.sk \[85.216.239.213\]:11661 I=\[193.107.88.166\]:25 closed by DROP in ACL
2020-06-04 14:07:10 1jgoeL-0006ae-Of SMTP connection from chello085216239213.chello.sk \[85.216.239.213\]:11857 I=\[193.107.88.166\]:25 closed by DROP in ACL
2020-06-04 14:07:26 1jgoeZ-0006aq-5o SMTP connection from chello085216239213.chello.sk \[85.216.239.213\]:11953 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-06-04 22:36:58
24.220.0.105 attackbotsspam
https://www.google.com/url?sa=t&url=http%3A%2F%2Fladarope.ru%2F
2020-06-04 22:33:21
139.199.108.83 attack
" "
2020-06-04 22:19:48
59.54.54.172 attack
Unauthorised access (Jun  4) SRC=59.54.54.172 LEN=52 TTL=116 ID=26012 DF TCP DPT=445 WINDOW=8192 SYN
2020-06-04 22:17:09
194.44.41.129 attack
Automatic report - Port Scan Attack
2020-06-04 22:19:27
192.99.212.132 attackspambots
Jun  4 16:02:06 eventyay sshd[30304]: Failed password for root from 192.99.212.132 port 45544 ssh2
Jun  4 16:06:11 eventyay sshd[30454]: Failed password for root from 192.99.212.132 port 49418 ssh2
...
2020-06-04 22:34:38
59.127.57.65 attack
TW_MAINT-TW-TWNIC_<177>1591272456 [1:2403400:57764] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 51 [Classification: Misc Attack] [Priority: 2]:  {TCP} 59.127.57.65:61917
2020-06-04 22:28:38
210.212.233.34 attack
Jun  4 14:19:26 abendstille sshd\[10306\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.212.233.34  user=root
Jun  4 14:19:28 abendstille sshd\[10306\]: Failed password for root from 210.212.233.34 port 35244 ssh2
Jun  4 14:23:27 abendstille sshd\[14451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.212.233.34  user=root
Jun  4 14:23:29 abendstille sshd\[14451\]: Failed password for root from 210.212.233.34 port 56248 ssh2
Jun  4 14:27:24 abendstille sshd\[18571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.212.233.34  user=root
...
2020-06-04 22:49:54

Recently Reported IPs

18.19.49.59 252.175.140.47 36.49.176.5 58.226.140.24
204.2.90.53 66.59.81.121 38.66.230.159 40.173.8.125
86.10.181.186 77.61.155.14 19.181.97.27 12.5.89.226
77.38.241.116 173.243.184.208 43.236.199.75 145.72.194.158
144.223.137.170 23.217.5.110 63.146.208.167 37.6.198.229