Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 123.139.89.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59630
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;123.139.89.42.			IN	A

;; AUTHORITY SECTION:
.			361	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030901 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 10 05:42:16 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 42.89.139.123.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.89.139.123.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.249.234.55 attack
Port Scan
...
2020-07-20 01:15:22
112.85.42.173 attackspambots
Jul 19 18:44:08 nextcloud sshd\[16891\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.173  user=root
Jul 19 18:44:10 nextcloud sshd\[16891\]: Failed password for root from 112.85.42.173 port 7196 ssh2
Jul 19 18:44:13 nextcloud sshd\[16891\]: Failed password for root from 112.85.42.173 port 7196 ssh2
2020-07-20 00:58:45
58.87.84.31 attackspam
Jul 19 22:19:42 dhoomketu sshd[1665962]: Invalid user boost from 58.87.84.31 port 32824
Jul 19 22:19:42 dhoomketu sshd[1665962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.84.31 
Jul 19 22:19:42 dhoomketu sshd[1665962]: Invalid user boost from 58.87.84.31 port 32824
Jul 19 22:19:44 dhoomketu sshd[1665962]: Failed password for invalid user boost from 58.87.84.31 port 32824 ssh2
Jul 19 22:22:33 dhoomketu sshd[1666037]: Invalid user etluser from 58.87.84.31 port 41522
...
2020-07-20 01:16:07
62.211.41.168 attack
Jul 19 18:42:40 home sshd[8000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.211.41.168
Jul 19 18:42:42 home sshd[8000]: Failed password for invalid user cut from 62.211.41.168 port 43822 ssh2
Jul 19 18:47:40 home sshd[8779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.211.41.168
...
2020-07-20 01:01:36
104.145.220.178 attackspam
Jul 19 18:02:05 www sshd[8959]: Invalid user admin from 104.145.220.178
Jul 19 18:02:05 www sshd[8959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.145.220.178 
Jul 19 18:02:07 www sshd[8959]: Failed password for invalid user admin from 104.145.220.178 port 50366 ssh2
Jul 19 18:02:07 www sshd[8959]: Received disconnect from 104.145.220.178: 11: Bye Bye [preauth]
Jul 19 18:02:08 www sshd[8961]: Invalid user admin from 104.145.220.178
Jul 19 18:02:08 www sshd[8961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.145.220.178 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=104.145.220.178
2020-07-20 00:56:34
222.73.246.141 attack
Jul 19 18:43:59 srv-ubuntu-dev3 sshd[88664]: Invalid user rohit from 222.73.246.141
Jul 19 18:43:59 srv-ubuntu-dev3 sshd[88664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.73.246.141
Jul 19 18:43:59 srv-ubuntu-dev3 sshd[88664]: Invalid user rohit from 222.73.246.141
Jul 19 18:44:00 srv-ubuntu-dev3 sshd[88664]: Failed password for invalid user rohit from 222.73.246.141 port 43843 ssh2
Jul 19 18:48:20 srv-ubuntu-dev3 sshd[89333]: Invalid user text from 222.73.246.141
Jul 19 18:48:20 srv-ubuntu-dev3 sshd[89333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.73.246.141
Jul 19 18:48:20 srv-ubuntu-dev3 sshd[89333]: Invalid user text from 222.73.246.141
Jul 19 18:48:21 srv-ubuntu-dev3 sshd[89333]: Failed password for invalid user text from 222.73.246.141 port 42192 ssh2
Jul 19 18:52:13 srv-ubuntu-dev3 sshd[89802]: Invalid user charlotte from 222.73.246.141
...
2020-07-20 01:11:28
2.38.186.191 attackspam
Automatic report - Banned IP Access
2020-07-20 01:07:56
14.177.239.168 attackspam
Jul 19 17:09:17 ns308116 sshd[22046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.177.239.168  user=postgres
Jul 19 17:09:20 ns308116 sshd[22046]: Failed password for postgres from 14.177.239.168 port 57979 ssh2
Jul 19 17:14:23 ns308116 sshd[31156]: Invalid user qnx from 14.177.239.168 port 44423
Jul 19 17:14:23 ns308116 sshd[31156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.177.239.168
Jul 19 17:14:25 ns308116 sshd[31156]: Failed password for invalid user qnx from 14.177.239.168 port 44423 ssh2
...
2020-07-20 01:24:07
203.249.17.86 attackbotsspam
Jul 19 19:10:39 buvik sshd[23236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.249.17.86
Jul 19 19:10:41 buvik sshd[23236]: Failed password for invalid user useradmin from 203.249.17.86 port 47360 ssh2
Jul 19 19:16:03 buvik sshd[24024]: Invalid user ama from 203.249.17.86
...
2020-07-20 01:24:34
79.125.183.146 attackspambots
xmlrpc attack
2020-07-20 01:07:36
192.95.6.110 attackspambots
2020-07-19T11:51:52.2594591495-001 sshd[17340]: Invalid user web from 192.95.6.110 port 50875
2020-07-19T11:51:53.7702181495-001 sshd[17340]: Failed password for invalid user web from 192.95.6.110 port 50875 ssh2
2020-07-19T11:56:29.0529701495-001 sshd[17588]: Invalid user ts from 192.95.6.110 port 58970
2020-07-19T11:56:29.0564661495-001 sshd[17588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=sa.signifi.com
2020-07-19T11:56:29.0529701495-001 sshd[17588]: Invalid user ts from 192.95.6.110 port 58970
2020-07-19T11:56:30.5816391495-001 sshd[17588]: Failed password for invalid user ts from 192.95.6.110 port 58970 ssh2
...
2020-07-20 00:48:50
222.186.173.238 attackbots
Jul 19 18:59:03 amit sshd\[23017\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.238  user=root
Jul 19 18:59:05 amit sshd\[23017\]: Failed password for root from 222.186.173.238 port 5248 ssh2
Jul 19 18:59:24 amit sshd\[23019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.238  user=root
...
2020-07-20 01:06:22
112.85.42.188 attack
07/19/2020-12:54:04.263371 112.85.42.188 Protocol: 6 ET SCAN Potential SSH Scan
2020-07-20 00:56:09
196.27.127.61 attack
2020-07-19T19:06:03.111298lavrinenko.info sshd[17772]: Invalid user webmaster from 196.27.127.61 port 50284
2020-07-19T19:06:03.116974lavrinenko.info sshd[17772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.27.127.61
2020-07-19T19:06:03.111298lavrinenko.info sshd[17772]: Invalid user webmaster from 196.27.127.61 port 50284
2020-07-19T19:06:04.776159lavrinenko.info sshd[17772]: Failed password for invalid user webmaster from 196.27.127.61 port 50284 ssh2
2020-07-19T19:08:29.363807lavrinenko.info sshd[17918]: Invalid user adam from 196.27.127.61 port 49666
...
2020-07-20 01:12:27
185.176.27.242 attackbots
07/19/2020-12:08:55.230516 185.176.27.242 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-07-20 00:53:54

Recently Reported IPs

123.139.80.196 123.139.90.120 123.139.90.149 123.139.90.194
123.139.90.89 123.139.92.175 123.14.104.147 123.14.105.149
123.14.105.44 123.14.107.187 123.14.108.135 123.14.108.31
123.14.108.57 123.14.108.89 123.14.109.96 123.14.110.34
121.210.80.185 123.14.110.93 123.14.111.117 123.14.111.182