Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.180.139.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6570
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.180.139.132.		IN	A

;; AUTHORITY SECTION:
.			178	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 18:13:53 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 132.139.180.119.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 132.139.180.119.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
130.211.246.128 attackspambots
2019-07-08T11:26:29.011698abusebot-5.cloudsearch.cf sshd\[10512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.246.211.130.bc.googleusercontent.com  user=root
2019-07-08 20:49:08
103.79.35.138 attackbots
TCP port 23 (Telnet) attempt blocked by firewall. [2019-07-08 10:21:37]
2019-07-08 20:30:43
117.81.225.40 attack
SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-07-08 20:19:08
201.22.178.3 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-08 08:21:34,084 INFO [shellcode_manager] (201.22.178.3) no match, writing hexdump (623a3dd32b9480d57acbe587f9bb3a76 :2079279) - MS17010 (EternalBlue)
2019-07-08 21:02:44
119.132.114.216 attackbotsspam
SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-07-08 20:13:28
116.7.202.206 attackbots
SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-07-08 20:34:50
121.8.124.244 attack
Jul  8 10:21:49 lnxded64 sshd[4842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.8.124.244
2019-07-08 20:54:30
116.7.203.72 attack
SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-07-08 20:32:17
51.89.19.147 attackbots
Jul  8 10:22:55 [host] sshd[21336]: Invalid user jj from 51.89.19.147
Jul  8 10:22:55 [host] sshd[21336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.19.147
Jul  8 10:22:57 [host] sshd[21336]: Failed password for invalid user jj from 51.89.19.147 port 58016 ssh2
2019-07-08 20:14:58
202.141.254.102 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-08 08:19:43,301 INFO [amun_request_handler] PortScan Detected on Port: 445 (202.141.254.102)
2019-07-08 20:26:39
80.10.13.142 attackspam
Caught in portsentry honeypot
2019-07-08 20:17:37
89.248.174.3 attackbotsspam
Bruteforce on SSH Honeypot
2019-07-08 20:52:10
103.57.210.12 attackspam
Jul  8 10:23:03 nextcloud sshd\[16050\]: Invalid user rfielding from 103.57.210.12
Jul  8 10:23:03 nextcloud sshd\[16050\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.57.210.12
Jul  8 10:23:05 nextcloud sshd\[16050\]: Failed password for invalid user rfielding from 103.57.210.12 port 54880 ssh2
...
2019-07-08 20:09:12
223.207.244.230 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-08 08:17:05,210 INFO [amun_request_handler] PortScan Detected on Port: 445 (223.207.244.230)
2019-07-08 20:52:37
31.4.66.153 attackspam
Jul  8 04:22:29 123flo sshd[61044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.4.66.153  user=root
Jul  8 04:22:32 123flo sshd[61044]: Failed password for root from 31.4.66.153 port 57104 ssh2
Jul  8 04:22:34 123flo sshd[61049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.4.66.153  user=root
Jul  8 04:22:37 123flo sshd[61049]: Failed password for root from 31.4.66.153 port 57198 ssh2
Jul  8 04:22:39 123flo sshd[61053]: Invalid user ubnt from 31.4.66.153
2019-07-08 20:24:19

Recently Reported IPs

119.180.139.114 119.180.139.130 119.180.139.141 119.180.139.148
119.180.139.167 119.180.139.156 119.180.139.16 115.99.144.169
116.0.23.239 116.1.231.129 116.1.43.30 119.180.143.79
119.180.152.153 119.180.153.102 119.180.152.97 119.180.153.11
119.180.146.127 119.180.153.17 119.180.153.15 119.180.152.204