Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.183.139.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36697
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;122.183.139.1.			IN	A

;; AUTHORITY SECTION:
.			143	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030900 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 10 02:12:51 CST 2022
;; MSG SIZE  rcvd: 106
Host info
1.139.183.122.in-addr.arpa domain name pointer telemedia-smb-001.139.183.122.airtelbroadband.in.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
1.139.183.122.in-addr.arpa	name = telemedia-smb-001.139.183.122.airtelbroadband.in.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
92.118.160.9 attackspambots
Honeypot attack, port: 389, PTR: 92.118.160.9.netsystemsresearch.com.
2019-08-19 21:00:19
159.65.54.221 attackbotsspam
Tried sshing with brute force.
2019-08-19 21:07:34
179.191.96.166 attackspambots
Aug 19 01:40:07 eddieflores sshd\[29674\]: Invalid user kmrczxcom from 179.191.96.166
Aug 19 01:40:07 eddieflores sshd\[29674\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.191.96.166
Aug 19 01:40:09 eddieflores sshd\[29674\]: Failed password for invalid user kmrczxcom from 179.191.96.166 port 39309 ssh2
Aug 19 01:45:17 eddieflores sshd\[30208\]: Invalid user com from 179.191.96.166
Aug 19 01:45:17 eddieflores sshd\[30208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.191.96.166
2019-08-19 21:04:27
177.69.245.136 attackbotsspam
$f2bV_matches
2019-08-19 21:21:33
70.125.42.101 attackspambots
Aug 19 14:58:43 MK-Soft-Root2 sshd\[17367\]: Invalid user ricca from 70.125.42.101 port 39470
Aug 19 14:58:43 MK-Soft-Root2 sshd\[17367\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.125.42.101
Aug 19 14:58:45 MK-Soft-Root2 sshd\[17367\]: Failed password for invalid user ricca from 70.125.42.101 port 39470 ssh2
...
2019-08-19 21:19:42
183.63.26.198 attack
CN China - Hits: 11
2019-08-19 21:44:59
51.91.25.201 attack
Invalid user tigger from 51.91.25.201 port 52912
2019-08-19 20:51:36
143.208.29.89 attackspam
$f2bV_matches
2019-08-19 21:01:21
138.197.186.226 attackbots
\[2019-08-19 12:25:00\] NOTICE\[19505\] res_pjsip/pjsip_distributor.c: Request 'REGISTER' from '\' failed for '138.197.186.226:44955' \(callid: AjIjRKZgU4A8u2DC8tckRaLL2PPh-Cta\) - Failed to authenticate
\[2019-08-19 12:25:00\] SECURITY\[1715\] res_security_log.c: SecurityEvent="ChallengeResponseFailed",EventTV="2019-08-19T12:25:00.554+0200",Severity="Error",Service="PJSIP",EventVersion="1",AccountID="\",SessionID="AjIjRKZgU4A8u2DC8tckRaLL2PPh-Cta",LocalAddress="IPV4/UDP/188.40.118.248/5060",RemoteAddress="IPV4/UDP/138.197.186.226/44955",Challenge="1566210300/0aad7e3f08872d36619a3cb7401ea021",Response="1b82fd9393283585a56f60099f2b9a75",ExpectedResponse=""
\[2019-08-19 12:25:02\] NOTICE\[3217\] res_pjsip/pjsip_distributor.c: Request 'REGISTER' from '\' failed for '138.197.186.226:58901' \(callid: TZN32omoWpnmIu2.7FkLxdJk3XMftKO4\) - Failed to authenticate
\[2019-08-19 12:25:02\] SECURITY\[1715\] res_security_log.c: SecurityEvent="Challenge
2019-08-19 20:50:09
187.107.136.134 attack
Aug 19 14:19:47 mail postfix/smtpd\[4264\]: warning: unknown\[187.107.136.134\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 19 14:19:47 mail postfix/smtpd\[3376\]: warning: unknown\[187.107.136.134\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 19 14:25:26 mail postfix/smtpd\[8920\]: warning: unknown\[187.107.136.134\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-08-19 20:49:16
118.24.19.178 attackspambots
Aug 19 14:42:58 server01 sshd\[11103\]: Invalid user 1qaz@WSX from 118.24.19.178
Aug 19 14:42:58 server01 sshd\[11103\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.19.178
Aug 19 14:43:00 server01 sshd\[11103\]: Failed password for invalid user 1qaz@WSX from 118.24.19.178 port 37258 ssh2
...
2019-08-19 21:29:46
107.175.92.132 attackbotsspam
Aug 19 00:58:28 php1 sshd\[1614\]: Invalid user display from 107.175.92.132
Aug 19 00:58:28 php1 sshd\[1614\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.175.92.132
Aug 19 00:58:30 php1 sshd\[1614\]: Failed password for invalid user display from 107.175.92.132 port 40520 ssh2
Aug 19 01:02:50 php1 sshd\[1986\]: Invalid user admin from 107.175.92.132
Aug 19 01:02:50 php1 sshd\[1986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.175.92.132
2019-08-19 21:09:05
114.5.81.67 attack
Aug 19 02:58:20 eddieflores sshd\[4839\]: Invalid user pi from 114.5.81.67
Aug 19 02:58:20 eddieflores sshd\[4841\]: Invalid user pi from 114.5.81.67
Aug 19 02:58:20 eddieflores sshd\[4839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.5.81.67
Aug 19 02:58:20 eddieflores sshd\[4841\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.5.81.67
Aug 19 02:58:22 eddieflores sshd\[4839\]: Failed password for invalid user pi from 114.5.81.67 port 50400 ssh2
2019-08-19 21:27:39
142.91.157.81 attack
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-08-19 21:35:13
40.73.65.160 attack
Aug 19 11:05:18 SilenceServices sshd[15999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.65.160
Aug 19 11:05:20 SilenceServices sshd[15999]: Failed password for invalid user desliga from 40.73.65.160 port 35890 ssh2
Aug 19 11:11:38 SilenceServices sshd[20777]: Failed password for root from 40.73.65.160 port 54474 ssh2
2019-08-19 21:27:00

Recently Reported IPs

122.183.137.190 122.183.139.101 122.183.139.107 122.183.139.109
122.183.139.98 122.183.242.53 122.183.242.54 122.183.243.66
122.183.243.68 122.183.244.43 122.183.244.51 122.183.34.59
122.184.55.210 122.185.135.68 122.185.145.182 122.185.161.116
122.185.178.178 122.185.179.222 122.185.180.186 122.185.183.234