Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.13.15.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54736
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;107.13.15.139.			IN	A

;; AUTHORITY SECTION:
.			203	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 14:21:09 CST 2022
;; MSG SIZE  rcvd: 106
Host info
139.15.13.107.in-addr.arpa domain name pointer mta-107-13-15-139.nc.rr.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.15.13.107.in-addr.arpa	name = mta-107-13-15-139.nc.rr.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
81.68.118.120 attackbots
2020-10-12T18:45:48.395452shield sshd\[11640\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.118.120  user=root
2020-10-12T18:45:50.539885shield sshd\[11640\]: Failed password for root from 81.68.118.120 port 53050 ssh2
2020-10-12T18:48:54.086145shield sshd\[12133\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.118.120  user=root
2020-10-12T18:48:56.094300shield sshd\[12133\]: Failed password for root from 81.68.118.120 port 36382 ssh2
2020-10-12T18:51:51.870817shield sshd\[12826\]: Invalid user rivera from 81.68.118.120 port 47940
2020-10-12T18:51:51.880266shield sshd\[12826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.118.120
2020-10-13 04:05:14
218.92.0.168 attackbotsspam
" "
2020-10-13 03:48:21
222.209.85.197 attackspam
SSH Remote Login Attempt Banned
2020-10-13 04:01:49
200.216.31.148 attack
Oct  4 18:43:12 v2202009116398126984 sshd[1836383]: Invalid user user from 200.216.31.148 port 6664
Oct  4 18:43:12 v2202009116398126984 sshd[1836383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.216.31.148 
Oct  4 18:43:12 v2202009116398126984 sshd[1836383]: Invalid user user from 200.216.31.148 port 6664
Oct  4 18:43:14 v2202009116398126984 sshd[1836383]: Failed password for invalid user user from 200.216.31.148 port 6664 ssh2
Oct 12 19:26:26 v2202009116398126984 sshd[2629925]: Invalid user user from 200.216.31.148 port 6664
...
2020-10-13 04:15:36
164.90.224.231 attackspambots
Invalid user temp from 164.90.224.231 port 48278
2020-10-13 04:11:01
165.22.3.210 attack
WordPress (CMS) attack attempts.
Date: 2020 Oct 12. 06:28:42
Source IP: 165.22.3.210

Portion of the log(s):
165.22.3.210 - [12/Oct/2020:06:28:39 +0200] "GET /wp-login.php HTTP/1.1" 200 1962 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.22.3.210 - [12/Oct/2020:06:28:40 +0200] "POST /wp-login.php HTTP/1.1" 200 2414 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.22.3.210 - [12/Oct/2020:06:28:40 +0200] "POST /xmlrpc.php HTTP/1.1" 404 118 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-10-13 03:58:55
106.13.82.231 attack
SSH Brute Force
2020-10-13 03:50:22
46.21.68.142 attack
11.10.2020 22:43:48 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2020-10-13 04:04:30
218.92.0.173 attackbotsspam
$f2bV_matches
2020-10-13 03:53:51
122.160.51.88 attackspambots
Oct 12 13:22:14 ns392434 sshd[4779]: Invalid user jensen from 122.160.51.88 port 20062
Oct 12 13:22:14 ns392434 sshd[4779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.160.51.88
Oct 12 13:22:14 ns392434 sshd[4779]: Invalid user jensen from 122.160.51.88 port 20062
Oct 12 13:22:16 ns392434 sshd[4779]: Failed password for invalid user jensen from 122.160.51.88 port 20062 ssh2
Oct 12 13:24:07 ns392434 sshd[4794]: Invalid user tanimoto from 122.160.51.88 port 33686
Oct 12 13:24:07 ns392434 sshd[4794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.160.51.88
Oct 12 13:24:07 ns392434 sshd[4794]: Invalid user tanimoto from 122.160.51.88 port 33686
Oct 12 13:24:09 ns392434 sshd[4794]: Failed password for invalid user tanimoto from 122.160.51.88 port 33686 ssh2
Oct 12 13:25:50 ns392434 sshd[4810]: Invalid user office from 122.160.51.88 port 46416
2020-10-13 04:06:15
36.133.121.14 attackspambots
Oct 12 17:20:45 prod4 sshd\[15152\]: Invalid user gast from 36.133.121.14
Oct 12 17:20:47 prod4 sshd\[15152\]: Failed password for invalid user gast from 36.133.121.14 port 37542 ssh2
Oct 12 17:24:35 prod4 sshd\[16796\]: Failed password for root from 36.133.121.14 port 47904 ssh2
...
2020-10-13 04:08:59
139.199.45.83 attack
Oct 12 17:30:43 minden010 sshd[13193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83
Oct 12 17:30:45 minden010 sshd[13193]: Failed password for invalid user celina from 139.199.45.83 port 45008 ssh2
Oct 12 17:35:20 minden010 sshd[14132]: Failed password for root from 139.199.45.83 port 39056 ssh2
...
2020-10-13 04:07:27
117.80.3.141 attack
(sshd) Failed SSH login from 117.80.3.141 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 12 09:38:16 server4 sshd[17936]: Invalid user yongxin from 117.80.3.141
Oct 12 09:38:16 server4 sshd[17936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.80.3.141 
Oct 12 09:38:18 server4 sshd[17936]: Failed password for invalid user yongxin from 117.80.3.141 port 36768 ssh2
Oct 12 09:54:59 server4 sshd[2855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.80.3.141  user=root
Oct 12 09:55:02 server4 sshd[2855]: Failed password for root from 117.80.3.141 port 54626 ssh2
2020-10-13 03:59:48
37.139.16.229 attackbots
Oct 12 21:09:40 ip106 sshd[16323]: Failed password for root from 37.139.16.229 port 34697 ssh2
Oct 12 21:16:46 ip106 sshd[16603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.16.229 
...
2020-10-13 04:08:28
220.184.74.80 attackbots
SSH Brute-Force reported by Fail2Ban
2020-10-13 04:02:17

Recently Reported IPs

186.33.72.4 154.85.101.194 31.43.101.61 223.74.185.33
111.12.217.74 91.241.137.157 14.177.16.106 177.52.160.32
13.78.165.253 42.113.120.123 195.161.52.4 125.62.213.33
107.172.53.150 122.247.251.181 23.184.48.241 45.7.210.195
113.246.17.200 35.188.134.104 103.12.161.16 117.222.178.92