Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.134.12.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35597
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.134.12.139.			IN	A

;; AUTHORITY SECTION:
.			424	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:27:57 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 139.12.134.105.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.12.134.105.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
221.120.217.18 attackspambots
Jun 24 02:27:32 SilenceServices sshd[25081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.120.217.18
Jun 24 02:27:33 SilenceServices sshd[25081]: Failed password for invalid user appuser from 221.120.217.18 port 15934 ssh2
Jun 24 02:29:00 SilenceServices sshd[25812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.120.217.18
2019-06-24 11:29:11
121.226.57.138 attack
2019-06-23T21:34:08.002396 X postfix/smtpd[39204]: warning: unknown[121.226.57.138]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-23T21:34:22.113772 X postfix/smtpd[39204]: warning: unknown[121.226.57.138]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-23T21:50:47.266726 X postfix/smtpd[41518]: warning: unknown[121.226.57.138]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-24 11:10:31
36.228.213.230 attack
DATE:2019-06-23_21:50:54, IP:36.228.213.230, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-06-24 11:07:29
194.44.94.71 attackbotsspam
Many RDP login attempts detected by IDS script
2019-06-24 11:49:56
139.162.112.248 attackbots
3389BruteforceFW21
2019-06-24 11:25:33
216.244.66.243 attack
20 attempts against mh-misbehave-ban on rock.magehost.pro
2019-06-24 11:49:27
2601:cd:c000:400:4c77:b176:5985:acbc attack
PHI,WP GET /wp-login.php
2019-06-24 11:34:38
139.59.79.56 attackspambots
Jun 24 03:20:10 debian sshd\[826\]: Invalid user test from 139.59.79.56 port 39252
Jun 24 03:20:10 debian sshd\[826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.79.56
...
2019-06-24 11:36:30
103.138.109.197 attackbotsspam
Jun 24 04:16:38 mail postfix/smtpd\[10035\]: warning: unknown\[103.138.109.197\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 24 04:16:45 mail postfix/smtpd\[10035\]: warning: unknown\[103.138.109.197\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 24 04:16:55 mail postfix/smtpd\[10035\]: warning: unknown\[103.138.109.197\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-24 11:09:57
162.247.74.27 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.27  user=root
Failed password for root from 162.247.74.27 port 46860 ssh2
Failed password for root from 162.247.74.27 port 46860 ssh2
Failed password for root from 162.247.74.27 port 46860 ssh2
Failed password for root from 162.247.74.27 port 46860 ssh2
2019-06-24 11:08:31
185.234.219.98 attack
Jun 24 03:45:24 mail postfix/smtpd\[12725\]: warning: unknown\[185.234.219.98\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jun 24 03:55:30 mail postfix/smtpd\[12873\]: warning: unknown\[185.234.219.98\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jun 24 04:26:04 mail postfix/smtpd\[13547\]: warning: unknown\[185.234.219.98\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jun 24 04:36:14 mail postfix/smtpd\[13606\]: warning: unknown\[185.234.219.98\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-06-24 11:47:05
171.221.206.201 attackbotsspam
Jun 24 04:39:57 server sshd\[25788\]: Invalid user calenda from 171.221.206.201 port 39016
Jun 24 04:39:57 server sshd\[25788\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.221.206.201
Jun 24 04:39:59 server sshd\[25788\]: Failed password for invalid user calenda from 171.221.206.201 port 39016 ssh2
Jun 24 04:43:22 server sshd\[24102\]: Invalid user kettle from 171.221.206.201 port 43751
Jun 24 04:43:22 server sshd\[24102\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.221.206.201
2019-06-24 11:44:37
222.93.104.167 attackbots
Trying ports that it shouldn't be.
2019-06-24 11:44:08
198.23.231.118 attack
contact form abuse, "increase traffic" spam words in content from Lorelei, likesviraldemo@gmail.com
2019-06-24 11:52:24
198.108.67.83 attackspam
" "
2019-06-24 11:47:39

Recently Reported IPs

105.133.213.212 105.133.185.73 105.133.201.155 105.133.194.136
105.133.197.255 105.133.221.65 105.133.178.153 105.133.67.94
105.133.196.128 105.133.189.107 105.133.160.125 105.133.145.51
105.133.229.198 105.133.139.84 105.133.60.69 105.133.171.132
105.133.115.184 105.133.100.137 105.133.156.8 105.132.79.27