Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.39.139.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45070
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.39.139.140.			IN	A

;; AUTHORITY SECTION:
.			505	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060501 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 06 11:52:30 CST 2024
;; MSG SIZE  rcvd: 107
Host info
Host 140.139.39.129.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 140.139.39.129.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.175.215 attack
$f2bV_matches
2020-03-10 19:29:04
92.118.38.58 attack
Mar 10 12:21:31 mail.srvfarm.net postfix/smtpd[490396]: warning: unknown[92.118.38.58]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 10 12:22:01 mail.srvfarm.net postfix/smtpd[489231]: warning: unknown[92.118.38.58]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 10 12:22:31 mail.srvfarm.net postfix/smtpd[508924]: warning: unknown[92.118.38.58]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 10 12:23:01 mail.srvfarm.net postfix/smtpd[508926]: warning: unknown[92.118.38.58]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 10 12:23:38 mail.srvfarm.net postfix/smtpd[508926]: warning: unknown[92.118.38.58]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-03-10 19:27:19
147.135.233.199 attackbots
Mar 10 12:46:42 MainVPS sshd[8842]: Invalid user redmine from 147.135.233.199 port 54914
Mar 10 12:46:42 MainVPS sshd[8842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.233.199
Mar 10 12:46:42 MainVPS sshd[8842]: Invalid user redmine from 147.135.233.199 port 54914
Mar 10 12:46:44 MainVPS sshd[8842]: Failed password for invalid user redmine from 147.135.233.199 port 54914 ssh2
Mar 10 12:50:31 MainVPS sshd[16039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.233.199  user=root
Mar 10 12:50:33 MainVPS sshd[16039]: Failed password for root from 147.135.233.199 port 41804 ssh2
...
2020-03-10 19:53:12
178.91.44.177 attackbots
(imapd) Failed IMAP login from 178.91.44.177 (KZ/Kazakhstan/178.91.44.177.megaline.telecom.kz): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Mar 10 12:55:30 ir1 dovecot[4133960]: imap-login: Disconnected (auth failed, 1 attempts in 3 secs): user=, method=PLAIN, rip=178.91.44.177, lip=5.63.12.44, TLS: Connection closed, session=<4BBHs3ygJeqyWyyx>
2020-03-10 19:44:43
112.85.42.173 attackbotsspam
Mar 10 12:21:06 eventyay sshd[23692]: Failed password for root from 112.85.42.173 port 13058 ssh2
Mar 10 12:21:09 eventyay sshd[23692]: Failed password for root from 112.85.42.173 port 13058 ssh2
Mar 10 12:21:20 eventyay sshd[23692]: error: maximum authentication attempts exceeded for root from 112.85.42.173 port 13058 ssh2 [preauth]
...
2020-03-10 19:21:34
191.193.10.149 attackbots
2020-03-10T11:42:22.415717dmca.cloudsearch.cf sshd[20605]: Invalid user xiehongjun from 191.193.10.149 port 44672
2020-03-10T11:42:22.423869dmca.cloudsearch.cf sshd[20605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.193.10.149
2020-03-10T11:42:22.415717dmca.cloudsearch.cf sshd[20605]: Invalid user xiehongjun from 191.193.10.149 port 44672
2020-03-10T11:42:24.609799dmca.cloudsearch.cf sshd[20605]: Failed password for invalid user xiehongjun from 191.193.10.149 port 44672 ssh2
2020-03-10T11:46:11.524678dmca.cloudsearch.cf sshd[20854]: Invalid user ts3server from 191.193.10.149 port 35942
2020-03-10T11:46:11.532751dmca.cloudsearch.cf sshd[20854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.193.10.149
2020-03-10T11:46:11.524678dmca.cloudsearch.cf sshd[20854]: Invalid user ts3server from 191.193.10.149 port 35942
2020-03-10T11:46:13.156582dmca.cloudsearch.cf sshd[20854]: Failed password for inva
...
2020-03-10 19:54:40
152.136.76.134 attack
Mar 10 09:17:59 hcbbdb sshd\[398\]: Invalid user alien from 152.136.76.134
Mar 10 09:17:59 hcbbdb sshd\[398\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.76.134
Mar 10 09:18:01 hcbbdb sshd\[398\]: Failed password for invalid user alien from 152.136.76.134 port 46334 ssh2
Mar 10 09:26:21 hcbbdb sshd\[1330\]: Invalid user 123456789 from 152.136.76.134
Mar 10 09:26:21 hcbbdb sshd\[1330\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.76.134
2020-03-10 19:17:46
134.119.204.60 attackbots
Repeated RDP login failures. Last user: Administrativo
2020-03-10 19:16:42
178.171.31.14 attackspam
Chat Spam
2020-03-10 19:47:14
134.209.152.90 attack
[munged]::443 134.209.152.90 - - [10/Mar/2020:10:23:56 +0100] "POST /[munged]: HTTP/1.1" 200 6625 "-" "-"
[munged]::443 134.209.152.90 - - [10/Mar/2020:10:24:07 +0100] "POST /[munged]: HTTP/1.1" 200 6490 "-" "-"
[munged]::443 134.209.152.90 - - [10/Mar/2020:10:24:23 +0100] "POST /[munged]: HTTP/1.1" 200 6487 "-" "-"
[munged]::443 134.209.152.90 - - [10/Mar/2020:10:24:40 +0100] "POST /[munged]: HTTP/1.1" 200 6490 "-" "-"
[munged]::443 134.209.152.90 - - [10/Mar/2020:10:24:55 +0100] "POST /[munged]: HTTP/1.1" 200 6489 "-" "-"
[munged]::443 134.209.152.90 - - [10/Mar/2020:10:25:11 +0100] "POST /[munged]: HTTP/1.1" 200 6490 "-" "-"
[munged]::443 134.209.152.90 - - [10/Mar/2020:10:25:28 +0100] "POST /[munged]: HTTP/1.1" 200 6488 "-" "-"
[munged]::443 134.209.152.90 - - [10/Mar/2020:10:25:43 +0100] "POST /[munged]: HTTP/1.1" 200 6493 "-" "-"
[munged]::443 134.209.152.90 - - [10/Mar/2020:10:25:59 +0100] "POST /[munged]: HTTP/1.1" 200 6490 "-" "-"
[munged]::443 134.209.152.90 - - [10/Mar/2020:10:26:15 +0100] "POST /[
2020-03-10 19:20:57
91.173.121.137 attackbotsspam
firewall-block, port(s): 22/tcp
2020-03-10 19:19:46
222.186.42.136 attackspambots
2020-01-01T11:56:45.608Z CLOSE host=222.186.42.136 port=58270 fd=4 time=20.020 bytes=23
...
2020-03-10 19:42:10
112.85.42.237 attackspam
Mar 10 05:50:35 NPSTNNYC01T sshd[27246]: Failed password for root from 112.85.42.237 port 31616 ssh2
Mar 10 05:51:06 NPSTNNYC01T sshd[27268]: Failed password for root from 112.85.42.237 port 24253 ssh2
...
2020-03-10 19:08:57
14.166.104.121 attackspambots
firewall-block, port(s): 8291/tcp
2020-03-10 19:31:15
222.254.92.51 attackspambots
Mar 10 10:26:14 localhost sshd\[22678\]: Invalid user user1 from 222.254.92.51 port 59121
Mar 10 10:26:14 localhost sshd\[22678\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.254.92.51
Mar 10 10:26:15 localhost sshd\[22678\]: Failed password for invalid user user1 from 222.254.92.51 port 59121 ssh2
2020-03-10 19:20:19

Recently Reported IPs

56.146.125.141 244.30.153.52 204.12.192.221 121.251.167.136
179.139.135.137 246.55.89.56 135.162.44.20 43.185.30.181
16.33.163.119 164.231.173.43 226.15.198.16 142.100.77.30
161.136.64.186 45.212.120.48 101.144.137.152 30.235.196.173
157.157.216.124 61.38.127.251 193.56.47.149 18.119.44.1