Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 100.139.75.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54765
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;100.139.75.139.			IN	A

;; AUTHORITY SECTION:
.			252	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020011201 1800 900 604800 86400

;; Query time: 106 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 13 09:31:45 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 139.75.139.100.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.75.139.100.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.4.5.221 attackbots
2020-10-05T02:27:00.967764server.mjenks.net sshd[521053]: Failed password for root from 45.4.5.221 port 42578 ssh2
2020-10-05T02:28:31.969645server.mjenks.net sshd[521278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.4.5.221  user=root
2020-10-05T02:28:33.514828server.mjenks.net sshd[521278]: Failed password for root from 45.4.5.221 port 34762 ssh2
2020-10-05T02:30:02.681249server.mjenks.net sshd[521429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.4.5.221  user=root
2020-10-05T02:30:04.718332server.mjenks.net sshd[521429]: Failed password for root from 45.4.5.221 port 55178 ssh2
...
2020-10-05 18:23:27
172.245.253.37 attack
uvcm 172.245.253.37 [05/Oct/2020:03:32:42 "https://www.techinexpert.com" "GET /wp-login.php?action=register 200 5358
172.245.253.37 [05/Oct/2020:03:32:44 "https://www.techinexpert.com/wp-login.php?action=register" "GET /wp-login.php?action=register 200 5358
172.245.253.37 [05/Oct/2020:03:32:53 "https://www.techinexpert.com/wp-login.php?action=register" "POST /wp-login.php?action=register 200 5468
2020-10-05 18:08:57
138.75.138.149 attackbotsspam
Listed on    zen-spamhaus also abuseat.org   / proto=6  .  srcport=55347  .  dstport=23 Telnet  .     (3507)
2020-10-05 17:55:29
180.76.167.78 attackspambots
Oct  5 04:09:28 shivevps sshd[16063]: Failed password for root from 180.76.167.78 port 60942 ssh2
Oct  5 04:13:02 shivevps sshd[16316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.167.78  user=root
Oct  5 04:13:05 shivevps sshd[16316]: Failed password for root from 180.76.167.78 port 46416 ssh2
...
2020-10-05 18:00:11
168.121.139.199 attackspam
"Test Inject  t'a=0"
2020-10-05 17:55:11
103.76.190.210 attackspambots
Dovecot Invalid User Login Attempt.
2020-10-05 18:19:32
106.12.202.119 attack
SSH login attempts.
2020-10-05 18:18:13
202.90.199.208 attack
Oct  5 10:48:30 vps647732 sshd[8459]: Failed password for root from 202.90.199.208 port 34892 ssh2
...
2020-10-05 18:13:46
120.237.118.144 attack
Oct  5 11:27:22  sshd\[15358\]: User root from 120.237.118.144 not allowed because not listed in AllowUsersOct  5 11:27:25  sshd\[15358\]: Failed password for invalid user root from 120.237.118.144 port 40094 ssh2
...
2020-10-05 18:21:43
45.142.120.39 attackbots
Oct  5 12:12:59 relay postfix/smtpd\[13532\]: warning: unknown\[45.142.120.39\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  5 12:13:01 relay postfix/smtpd\[14913\]: warning: unknown\[45.142.120.39\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  5 12:13:09 relay postfix/smtpd\[12988\]: warning: unknown\[45.142.120.39\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  5 12:13:10 relay postfix/smtpd\[13571\]: warning: unknown\[45.142.120.39\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  5 12:13:17 relay postfix/smtpd\[14374\]: warning: unknown\[45.142.120.39\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-10-05 18:16:49
119.45.61.98 attackspambots
DATE:2020-10-04 22:35:44,IP:119.45.61.98,MATCHES:10,PORT:ssh
2020-10-05 17:54:29
180.250.248.169 attackbots
Oct  5 02:03:49 ourumov-web sshd\[29276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.248.169  user=root
Oct  5 02:03:51 ourumov-web sshd\[29276\]: Failed password for root from 180.250.248.169 port 60486 ssh2
Oct  5 02:11:30 ourumov-web sshd\[29807\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.248.169  user=root
...
2020-10-05 18:14:03
106.13.104.8 attack
Found on   CINS badguys     / proto=6  .  srcport=54148  .  dstport=11451  .     (3502)
2020-10-05 18:25:25
188.166.232.56 attack
Oct  5 07:06:12 inter-technics sshd[7435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.232.56  user=root
Oct  5 07:06:14 inter-technics sshd[7435]: Failed password for root from 188.166.232.56 port 55646 ssh2
Oct  5 07:10:32 inter-technics sshd[7846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.232.56  user=root
Oct  5 07:10:34 inter-technics sshd[7846]: Failed password for root from 188.166.232.56 port 34920 ssh2
Oct  5 07:14:48 inter-technics sshd[8206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.232.56  user=root
Oct  5 07:14:50 inter-technics sshd[8206]: Failed password for root from 188.166.232.56 port 42418 ssh2
...
2020-10-05 18:15:20
92.247.93.142 attackspam
Registration form abuse
2020-10-05 17:58:06

Recently Reported IPs

211.136.96.179 65.49.20.69 14.254.127.169 76.19.119.78
106.52.89.51 146.88.201.253 223.95.89.248 196.218.185.218
54.5.28.157 104.192.163.119 80.213.194.37 45.14.148.98
120.29.109.169 94.191.90.85 89.248.168.63 36.78.3.92
14.245.6.87 13.235.63.208 45.139.186.79 111.229.51.62