Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.55.37.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27915
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.55.37.139.			IN	A

;; AUTHORITY SECTION:
.			370	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031300 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 13 21:30:21 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 139.37.55.12.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.37.55.12.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
139.59.66.101 attackspam
Jul 12 15:31:52 scw-6657dc sshd[29892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.66.101
Jul 12 15:31:52 scw-6657dc sshd[29892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.66.101
Jul 12 15:31:54 scw-6657dc sshd[29892]: Failed password for invalid user sharon from 139.59.66.101 port 60226 ssh2
...
2020-07-13 02:00:00
94.25.229.103 attack
Fail2Ban Ban Triggered
HTTP SQL Injection Attempt
2020-07-13 02:19:36
185.39.10.47 attackbots
Jul 12 20:06:56 debian-2gb-nbg1-2 kernel: \[16835793.958466\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.39.10.47 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=23228 PROTO=TCP SPT=43737 DPT=6607 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-13 02:12:05
162.243.132.27 attackbots
[Sat Jun 27 10:58:10 2020] - DDoS Attack From IP: 162.243.132.27 Port: 59286
2020-07-13 02:14:10
187.63.167.59 attackbotsspam
Unauthorised access (Jul 12) SRC=187.63.167.59 LEN=52 TTL=114 ID=28910 DF TCP DPT=445 WINDOW=8192 SYN
2020-07-13 02:13:46
180.76.138.132 attack
Jul 12 13:50:00 eventyay sshd[7846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.138.132
Jul 12 13:50:02 eventyay sshd[7846]: Failed password for invalid user victor from 180.76.138.132 port 40854 ssh2
Jul 12 13:54:31 eventyay sshd[8016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.138.132
...
2020-07-13 02:10:25
125.64.94.130 attackspam
" "
2020-07-13 02:16:46
117.50.65.167 attackspam
Honeypot attack, port: 5555, PTR: PTR record not found
2020-07-13 01:55:27
190.186.42.130 attack
Automatic report BANNED IP
2020-07-13 02:00:21
190.75.159.223 attackbots
Unauthorized connection attempt from IP address 190.75.159.223 on Port 445(SMB)
2020-07-13 02:10:13
151.80.83.249 attack
2020-07-12T18:18:55+0200 Failed SSH Authentication/Brute Force Attack. (Server 4)
2020-07-13 01:53:52
203.92.47.40 attack
Jul 12 15:32:09 vps687878 sshd\[11666\]: Invalid user lby from 203.92.47.40 port 53712
Jul 12 15:32:09 vps687878 sshd\[11666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.92.47.40
Jul 12 15:32:11 vps687878 sshd\[11666\]: Failed password for invalid user lby from 203.92.47.40 port 53712 ssh2
Jul 12 15:33:05 vps687878 sshd\[11879\]: Invalid user yoshida from 203.92.47.40 port 36374
Jul 12 15:33:05 vps687878 sshd\[11879\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.92.47.40
...
2020-07-13 02:31:00
45.14.150.51 attack
Jul 12 20:10:13 sip sshd[914296]: Invalid user weiwei from 45.14.150.51 port 34794
Jul 12 20:10:15 sip sshd[914296]: Failed password for invalid user weiwei from 45.14.150.51 port 34794 ssh2
Jul 12 20:18:58 sip sshd[914324]: Invalid user oradev from 45.14.150.51 port 59970
...
2020-07-13 02:30:13
218.92.0.191 attackbots
Jul 12 20:06:46 dcd-gentoo sshd[5962]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Jul 12 20:06:49 dcd-gentoo sshd[5962]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Jul 12 20:06:49 dcd-gentoo sshd[5962]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.191 port 14807 ssh2
...
2020-07-13 02:14:28
61.185.114.130 attackbots
2020-07-12T16:25:41.523361abusebot-5.cloudsearch.cf sshd[29207]: Invalid user obd from 61.185.114.130 port 60076
2020-07-12T16:25:41.529332abusebot-5.cloudsearch.cf sshd[29207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.185.114.130
2020-07-12T16:25:41.523361abusebot-5.cloudsearch.cf sshd[29207]: Invalid user obd from 61.185.114.130 port 60076
2020-07-12T16:25:43.066560abusebot-5.cloudsearch.cf sshd[29207]: Failed password for invalid user obd from 61.185.114.130 port 60076 ssh2
2020-07-12T16:30:41.104761abusebot-5.cloudsearch.cf sshd[29261]: Invalid user balasandhya from 61.185.114.130 port 50688
2020-07-12T16:30:41.110800abusebot-5.cloudsearch.cf sshd[29261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.185.114.130
2020-07-12T16:30:41.104761abusebot-5.cloudsearch.cf sshd[29261]: Invalid user balasandhya from 61.185.114.130 port 50688
2020-07-12T16:30:42.834435abusebot-5.cloudsearch.cf sshd[2
...
2020-07-13 02:28:10

Recently Reported IPs

127.5.4.25 148.66.212.85 75.4.20.26 0.8.244.192
115.24.250.184 95.4.94.103 209.112.217.120 17.18.4.72
53.37.50.8 30.18.4.200 51.41.23.7 109.95.72.5
196.25.7.30 11.97.6.236 19.34.1.81 30.80.6.157
85.31.173.129 240.74.56.82 165.154.43.223 165.43.149.182