Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 84.139.30.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56445
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;84.139.30.138.			IN	A

;; AUTHORITY SECTION:
.			507	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020091001 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 11 05:08:28 CST 2020
;; MSG SIZE  rcvd: 117
Host info
138.30.139.84.in-addr.arpa domain name pointer p548b1e8a.dip0.t-ipconnect.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.30.139.84.in-addr.arpa	name = p548b1e8a.dip0.t-ipconnect.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
92.240.206.69 attackspambots
Chat Spam
2020-03-07 02:44:56
93.183.131.148 attackspambots
Scan detected and blocked 2020.03.06 14:30:11
2020-03-07 02:36:36
5.236.19.149 attack
IP: 5.236.19.149
Ports affected
    World Wide Web HTTP (80) 
Abuse Confidence rating 41%
Found in DNSBL('s)
ASN Details
   AS58224 Iran Telecommunication Company PJS
   Iran (IR)
   CIDR 5.236.0.0/17
Log Date: 6/03/2020 1:12:15 PM UTC
2020-03-07 02:43:49
183.145.60.52 attack
suspicious action Fri, 06 Mar 2020 10:30:14 -0300
2020-03-07 02:31:46
45.55.65.92 attackbots
Port 10192 scan denied
2020-03-07 02:52:39
123.176.98.150 attack
Honeypot attack, port: 445, PTR: 123-176-98-150.layerdns.cloud.
2020-03-07 02:29:12
146.164.68.140 attack
[munged]::80 146.164.68.140 - - [06/Mar/2020:14:42:04 +0100] "POST /[munged]: HTTP/1.1" 200 1924 "-" "-"
[munged]::80 146.164.68.140 - - [06/Mar/2020:14:42:16 +0100] "POST /[munged]: HTTP/1.1" 200 1924 "-" "-"
[munged]::80 146.164.68.140 - - [06/Mar/2020:14:42:32 +0100] "POST /[munged]: HTTP/1.1" 200 1924 "-" "-"
[munged]::80 146.164.68.140 - - [06/Mar/2020:14:42:48 +0100] "POST /[munged]: HTTP/1.1" 200 1924 "-" "-"
[munged]::80 146.164.68.140 - - [06/Mar/2020:14:43:04 +0100] "POST /[munged]: HTTP/1.1" 200 1924 "-" "-"
[munged]::80 146.164.68.140 - - [06/Mar/2020:14:43:20 +0100] "POST /[munged]: HTTP/1.1" 200 1924 "-" "-"
[munged]::80 146.164.68.140 - - [06/Mar/2020:14:43:36 +0100] "POST /[munged]: HTTP/1.1" 200 1924 "-" "-"
[munged]::80 146.164.68.140 - - [06/Mar/2020:14:43:52 +0100] "POST /[munged]: HTTP/1.1" 200 1924 "-" "-"
[munged]::80 146.164.68.140 - - [06/Mar/2020:14:44:08 +0100] "POST /[munged]: HTTP/1.1" 200 1924 "-" "-"
[munged]::80 146.164.68.140 - - [06/Mar/2020:14:44:24 +0100] "POST /[munged]: H
2020-03-07 02:56:25
158.69.220.70 attackbotsspam
Mar  6 16:10:00 *** sshd[28191]: User root from 158.69.220.70 not allowed because not listed in AllowUsers
2020-03-07 02:55:53
223.205.232.245 attackspam
Unauthorized connection attempt from IP address 223.205.232.245 on Port 445(SMB)
2020-03-07 02:28:09
88.121.22.235 attackbotsspam
$f2bV_matches
2020-03-07 03:02:42
115.72.240.137 attack
Honeypot attack, port: 81, PTR: adsl.viettel.vn.
2020-03-07 02:27:31
36.72.23.106 attackbots
Unauthorized connection attempt from IP address 36.72.23.106 on Port 445(SMB)
2020-03-07 02:41:29
87.103.174.61 attackbotsspam
Spammer
2020-03-07 02:49:23
140.143.136.89 attackspam
Mar  6 08:49:45 eddieflores sshd\[24684\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.136.89  user=root
Mar  6 08:49:47 eddieflores sshd\[24684\]: Failed password for root from 140.143.136.89 port 43702 ssh2
Mar  6 08:54:37 eddieflores sshd\[25116\]: Invalid user arthur from 140.143.136.89
Mar  6 08:54:37 eddieflores sshd\[25116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.136.89
Mar  6 08:54:39 eddieflores sshd\[25116\]: Failed password for invalid user arthur from 140.143.136.89 port 42122 ssh2
2020-03-07 03:07:08
190.111.16.228 attackbotsspam
firewall-block, port(s): 1433/tcp
2020-03-07 02:50:49

Recently Reported IPs

246.255.167.147 87.141.233.38 81.181.109.27 180.160.19.190
89.73.182.27 214.29.141.241 223.19.228.127 181.214.99.156
84.52.131.229 5.105.234.254 218.144.48.32 131.61.111.106
223.17.12.61 196.113.219.234 50.41.140.195 113.24.76.192
112.235.73.144 58.127.154.47 201.62.155.78 208.208.150.248