Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Daejeon

Region: Daejeon

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 115.139.130.195
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13951
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;115.139.130.195.		IN	A

;; AUTHORITY SECTION:
.			146	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020021803 1800 900 604800 86400

;; Query time: 107 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 05:11:41 CST 2020
;; MSG SIZE  rcvd: 119
Host info
Host 195.130.139.115.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 195.130.139.115.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.56.158.27 attack
(mod_security) mod_security (id:230011) triggered by 103.56.158.27 (VN/Vietnam/-): 5 in the last 3600 secs
2020-01-31 07:26:43
211.195.117.212 attackspambots
Unauthorized connection attempt detected from IP address 211.195.117.212 to port 2220 [J]
2020-01-31 07:08:52
78.154.187.92 attackbots
1580420278 - 01/30/2020 22:37:58 Host: 78.154.187.92/78.154.187.92 Port: 445 TCP Blocked
2020-01-31 07:38:18
61.19.32.146 attackspambots
20/1/30@16:38:16: FAIL: Alarm-Network address from=61.19.32.146
...
2020-01-31 07:23:12
94.69.17.199 attack
Honeypot attack, port: 81, PTR: ppp-94-69-17-199.home.otenet.gr.
2020-01-31 07:41:15
201.156.46.196 attack
Unauthorized connection attempt detected from IP address 201.156.46.196 to port 80 [J]
2020-01-31 07:09:17
186.94.92.167 attack
Honeypot attack, port: 445, PTR: 186-94-92-167.genericrev.cantv.net.
2020-01-31 07:27:35
179.111.212.130 attack
Unauthorized connection attempt detected from IP address 179.111.212.130 to port 23 [J]
2020-01-31 07:44:25
89.134.210.221 attackbots
1580420316 - 01/30/2020 22:38:36 Host: 89.134.210.221/89.134.210.221 Port: 445 TCP Blocked
2020-01-31 07:05:24
111.95.141.34 attackbots
Jan 30 13:19:11 eddieflores sshd\[15287\]: Invalid user jalakantha from 111.95.141.34
Jan 30 13:19:11 eddieflores sshd\[15287\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.95.141.34
Jan 30 13:19:13 eddieflores sshd\[15287\]: Failed password for invalid user jalakantha from 111.95.141.34 port 51403 ssh2
Jan 30 13:22:52 eddieflores sshd\[15714\]: Invalid user taanusiya123 from 111.95.141.34
Jan 30 13:22:52 eddieflores sshd\[15714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.95.141.34
2020-01-31 07:26:10
89.248.167.133 attackbots
Jan 30 17:42:19 : SSH login attempts with invalid user
2020-01-31 07:43:10
165.22.216.182 attackspam
RDP Brute-Force (honeypot 6)
2020-01-31 07:29:54
163.44.207.210 attack
2020-01-30 22:38:07 H=(163-44-207-210.openstacklocal) [163.44.207.210] sender verify fail for : Unrouteable address
2020-01-30 22:38:07 H=(163-44-207-210.openstacklocal) [163.44.207.210] F= rejected RCPT : Sender verify failed
...
2020-01-31 07:28:52
85.132.110.184 attackspam
Unauthorized connection attempt detected from IP address 85.132.110.184 to port 81 [J]
2020-01-31 07:29:14
89.248.160.193 attackspambots
Multiport scan : 78 ports scanned 10004 10036 10052 10054 10086 10102 10117 10203 10236 10243 10252 10264 10280 10315 10342 10350 10363 10364 10369 10370 10374 10380 10384 10396 10406 10412 10441 10450 10460 10461 10474 10493 10530 10541 10574 10590 10606 10612 10638 10674 10695 10699 10727 10752 10759 10768 10835 10851 10861 10867 10877 10910 11106 11113 11131 11177 11196 11204 11209 11212 11240 11241 11254 11263 11286 11293 11295 .....
2020-01-31 07:14:32

Recently Reported IPs

217.62.102.146 223.20.92.12 120.228.124.168 221.8.81.167
197.228.71.103 117.57.160.88 168.122.117.196 181.17.218.136
187.35.185.254 161.47.68.140 210.206.176.207 185.16.122.31
124.250.55.16 97.71.128.19 213.19.148.253 101.51.68.204
93.156.1.219 78.46.162.196 31.41.189.127 18.28.179.253