Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 111.189.135.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11729
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;111.189.135.139.		IN	A

;; AUTHORITY SECTION:
.			551	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024020800 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 08 23:43:56 CST 2024
;; MSG SIZE  rcvd: 108
Host info
139.135.189.111.in-addr.arpa domain name pointer softbank111189135139.bbtec.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.135.189.111.in-addr.arpa	name = softbank111189135139.bbtec.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
24.232.29.188 attackspam
Sep  1 20:20:19 dedicated sshd[7232]: Invalid user dominic from 24.232.29.188 port 50104
2019-09-02 02:30:41
82.202.226.147 attack
wp-login / xmlrpc attacks
Firefox version 62.0 running on Linux
Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0
2019-09-02 02:03:08
182.61.61.222 attack
Sep  1 18:41:33 apollo sshd\[15931\]: Invalid user mythtv from 182.61.61.222Sep  1 18:41:35 apollo sshd\[15931\]: Failed password for invalid user mythtv from 182.61.61.222 port 35956 ssh2Sep  1 18:52:50 apollo sshd\[15946\]: Failed password for root from 182.61.61.222 port 34738 ssh2
...
2019-09-02 01:34:42
81.177.49.60 attackbotsspam
wp-login / xmlrpc attacks
Firefox version 62.0 running on Linux
Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0
2019-09-02 02:29:05
85.167.35.125 attack
Sep  1 19:36:51 host sshd\[46014\]: Invalid user bc from 85.167.35.125 port 44730
Sep  1 19:36:53 host sshd\[46014\]: Failed password for invalid user bc from 85.167.35.125 port 44730 ssh2
...
2019-09-02 02:30:02
222.186.42.241 attackbotsspam
Sep  1 14:07:28 debian sshd[23724]: Unable to negotiate with 222.186.42.241 port 54332: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Sep  1 14:20:09 debian sshd[24421]: Unable to negotiate with 222.186.42.241 port 34418: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
...
2019-09-02 02:29:37
184.146.67.0 attackbots
Portscan or hack attempt detected by psad/fwsnort
2019-09-02 02:27:46
193.70.0.42 attackspambots
Sep  1 19:37:39 ubuntu-2gb-nbg1-dc3-1 sshd[28300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.0.42
Sep  1 19:37:41 ubuntu-2gb-nbg1-dc3-1 sshd[28300]: Failed password for invalid user musikbot from 193.70.0.42 port 51122 ssh2
...
2019-09-02 01:52:41
217.182.253.230 attackspam
Sep  1 07:48:57 hanapaa sshd\[13572\]: Invalid user david from 217.182.253.230
Sep  1 07:48:57 hanapaa sshd\[13572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=230.ip-217-182-253.eu
Sep  1 07:48:58 hanapaa sshd\[13572\]: Failed password for invalid user david from 217.182.253.230 port 42574 ssh2
Sep  1 07:52:59 hanapaa sshd\[13849\]: Invalid user connie from 217.182.253.230
Sep  1 07:52:59 hanapaa sshd\[13849\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=230.ip-217-182-253.eu
2019-09-02 01:58:37
103.56.113.69 attackspam
Sep  1 07:27:46 sachi sshd\[10452\]: Invalid user 123456 from 103.56.113.69
Sep  1 07:27:46 sachi sshd\[10452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.56.113.69
Sep  1 07:27:48 sachi sshd\[10452\]: Failed password for invalid user 123456 from 103.56.113.69 port 57317 ssh2
Sep  1 07:37:34 sachi sshd\[11329\]: Invalid user 123 from 103.56.113.69
Sep  1 07:37:34 sachi sshd\[11329\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.56.113.69
2019-09-02 01:57:08
171.244.39.155 attackspambots
Sep  1 13:33:47 xtremcommunity sshd\[5565\]: Invalid user ad from 171.244.39.155 port 35578
Sep  1 13:33:47 xtremcommunity sshd\[5565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.39.155
Sep  1 13:33:49 xtremcommunity sshd\[5565\]: Failed password for invalid user ad from 171.244.39.155 port 35578 ssh2
Sep  1 13:39:02 xtremcommunity sshd\[5719\]: Invalid user silvio from 171.244.39.155 port 54472
Sep  1 13:39:02 xtremcommunity sshd\[5719\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.39.155
...
2019-09-02 01:40:43
35.202.27.205 attackspam
Sep  1 07:31:26 sachi sshd\[10763\]: Invalid user musique from 35.202.27.205
Sep  1 07:31:26 sachi sshd\[10763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.27.202.35.bc.googleusercontent.com
Sep  1 07:31:28 sachi sshd\[10763\]: Failed password for invalid user musique from 35.202.27.205 port 45938 ssh2
Sep  1 07:37:50 sachi sshd\[11352\]: Invalid user test from 35.202.27.205
Sep  1 07:37:50 sachi sshd\[11352\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.27.202.35.bc.googleusercontent.com
2019-09-02 01:47:00
198.199.113.209 attackspam
Sep  1 07:31:47 web9 sshd\[32443\]: Invalid user radmin from 198.199.113.209
Sep  1 07:31:47 web9 sshd\[32443\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.113.209
Sep  1 07:31:49 web9 sshd\[32443\]: Failed password for invalid user radmin from 198.199.113.209 port 60816 ssh2
Sep  1 07:37:44 web9 sshd\[1168\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.113.209  user=root
Sep  1 07:37:46 web9 sshd\[1168\]: Failed password for root from 198.199.113.209 port 49366 ssh2
2019-09-02 01:49:16
14.204.84.12 attackspambots
Sep  1 11:10:07 home sshd[26088]: Invalid user ethereal from 14.204.84.12 port 48246
Sep  1 11:10:07 home sshd[26088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.204.84.12
Sep  1 11:10:07 home sshd[26088]: Invalid user ethereal from 14.204.84.12 port 48246
Sep  1 11:10:09 home sshd[26088]: Failed password for invalid user ethereal from 14.204.84.12 port 48246 ssh2
Sep  1 11:19:31 home sshd[26120]: Invalid user laravel from 14.204.84.12 port 45512
Sep  1 11:19:31 home sshd[26120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.204.84.12
Sep  1 11:19:31 home sshd[26120]: Invalid user laravel from 14.204.84.12 port 45512
Sep  1 11:19:33 home sshd[26120]: Failed password for invalid user laravel from 14.204.84.12 port 45512 ssh2
Sep  1 11:26:36 home sshd[26153]: Invalid user vi from 14.204.84.12 port 56650
Sep  1 11:26:36 home sshd[26153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rh
2019-09-02 02:31:46
47.62.218.21 attackbotsspam
Automatic report - Port Scan Attack
2019-09-02 01:36:20

Recently Reported IPs

111.189.24.19 111.189.233.23 111.189.209.195 111.189.226.241
111.188.58.194 111.19.147.90 111.189.185.138 111.189.232.192
111.188.88.77 111.189.140.73 111.189.193.205 111.19.125.216
111.188.46.112 111.19.116.197 111.188.234.57 111.188.21.209
111.188.34.104 111.188.251.48 111.188.24.140 111.188.50.205