Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
1.0.139.183 attackbots
Unauthorized connection attempt detected from IP address 1.0.139.183 to port 80 [J]
2020-01-27 15:25:33
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.0.139.111
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21998
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.0.139.111.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022302 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 24 05:55:56 CST 2022
;; MSG SIZE  rcvd: 104
Host info
111.139.0.1.in-addr.arpa domain name pointer node-29b.pool-1-0.dynamic.totinternet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
111.139.0.1.in-addr.arpa	name = node-29b.pool-1-0.dynamic.totinternet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.133.99.130 attackbots
Mar  9 13:22:22 relay postfix/smtpd\[24118\]: warning: unknown\[45.133.99.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar  9 13:22:43 relay postfix/smtpd\[27472\]: warning: unknown\[45.133.99.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar  9 13:34:12 relay postfix/smtpd\[27472\]: warning: unknown\[45.133.99.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar  9 13:34:34 relay postfix/smtpd\[17976\]: warning: unknown\[45.133.99.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar  9 13:38:15 relay postfix/smtpd\[2597\]: warning: unknown\[45.133.99.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-03-09 20:40:59
65.182.2.241 attackbots
5x Failed Password
2020-03-09 20:59:24
171.48.119.177 attack
Email rejected due to spam filtering
2020-03-09 20:49:11
157.245.133.69 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2020-03-09 20:23:54
2.63.73.197 attack
Unauthorized connection attempt from IP address 2.63.73.197 on Port 445(SMB)
2020-03-09 20:54:31
49.233.174.48 attackspambots
Fail2Ban Ban Triggered (2)
2020-03-09 20:51:37
2.45.105.77 attackspambots
Automatic report - Port Scan Attack
2020-03-09 20:32:41
170.82.188.9 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-09 21:03:34
144.217.113.192 attackspam
SQL injection attempt.
2020-03-09 20:37:38
136.232.210.98 attackspam
Unauthorized connection attempt from IP address 136.232.210.98 on Port 445(SMB)
2020-03-09 20:45:02
103.23.155.137 attackspambots
Mar  9 12:03:31 srv01 sshd[3198]: Invalid user dods from 103.23.155.137 port 43218
Mar  9 12:03:31 srv01 sshd[3198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.23.155.137
Mar  9 12:03:31 srv01 sshd[3198]: Invalid user dods from 103.23.155.137 port 43218
Mar  9 12:03:34 srv01 sshd[3198]: Failed password for invalid user dods from 103.23.155.137 port 43218 ssh2
Mar  9 12:09:31 srv01 sshd[3825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.23.155.137  user=root
Mar  9 12:09:34 srv01 sshd[3825]: Failed password for root from 103.23.155.137 port 51234 ssh2
...
2020-03-09 20:29:47
212.0.153.138 attack
Unauthorized connection attempt from IP address 212.0.153.138 on Port 445(SMB)
2020-03-09 20:47:52
222.186.175.167 attackspambots
Mar  9 13:57:01 SilenceServices sshd[13944]: Failed password for root from 222.186.175.167 port 58478 ssh2
Mar  9 13:57:14 SilenceServices sshd[13944]: error: maximum authentication attempts exceeded for root from 222.186.175.167 port 58478 ssh2 [preauth]
Mar  9 13:57:20 SilenceServices sshd[14056]: Failed password for root from 222.186.175.167 port 42812 ssh2
2020-03-09 20:57:59
183.88.168.160 attackspam
Unauthorized connection attempt from IP address 183.88.168.160 on Port 445(SMB)
2020-03-09 20:41:23
185.94.111.1 attackspam
03/09/2020-08:24:31.694742 185.94.111.1 Protocol: 17 GPL RPC portmap listing UDP 111
2020-03-09 20:29:28

Recently Reported IPs

1.0.139.11 1.0.139.112 1.0.139.117 1.0.139.118
61.79.199.96 1.0.139.12 1.0.139.125 1.0.139.131
1.0.139.134 61.96.194.89 1.0.139.136 145.40.189.0
1.0.139.139 145.40.189.210 1.0.139.146 1.0.139.148
1.0.139.15 1.0.139.153 1.0.142.134 1.0.142.137