Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.139.20.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52609
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.139.20.119.			IN	A

;; AUTHORITY SECTION:
.			312	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023060602 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 07 08:45:06 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 119.20.139.13.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 119.20.139.13.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
170.245.235.206 attackbots
Dec 26 00:45:56 XXXXXX sshd[2070]: Invalid user armand from 170.245.235.206 port 51974
2019-12-26 09:07:31
80.211.29.172 attackbotsspam
2019-12-26T01:46:46.861946stark.klein-stark.info sshd\[25967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.29.172  user=root
2019-12-26T01:46:49.094338stark.klein-stark.info sshd\[25967\]: Failed password for root from 80.211.29.172 port 55534 ssh2
2019-12-26T01:46:50.102468stark.klein-stark.info sshd\[25971\]: Invalid user admin from 80.211.29.172 port 58288
...
2019-12-26 09:02:20
64.233.184.129 attackbots
CloudCIX Reconnaissance Scan Detected, PTR: wa-in-f129.1e100.net.
2019-12-26 09:08:04
185.36.81.248 attackspam
2019-12-26 dovecot_login authenticator failed for \(User\) \[185.36.81.248\]: 535 Incorrect authentication data \(set_id=sales\)
2019-12-26 dovecot_login authenticator failed for \(User\) \[185.36.81.248\]: 535 Incorrect authentication data \(set_id=sales\)
2019-12-26 dovecot_login authenticator failed for \(User\) \[185.36.81.248\]: 535 Incorrect authentication data \(set_id=sales\)
2019-12-26 13:03:43
103.76.82.180 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 26-12-2019 05:00:09.
2019-12-26 13:11:50
116.213.144.93 attack
--- report ---
Dec 25 19:59:37 sshd: Connection from 116.213.144.93 port 39250
Dec 25 19:59:59 sshd: Invalid user dgabruck from 116.213.144.93
2019-12-26 09:21:34
210.210.116.203 attack
CloudCIX Reconnaissance Scan Detected, PTR: 210-210-116-203.lan.sify.net.
2019-12-26 09:01:22
217.76.158.124 attackspambots
Dec 26 00:37:01 localhost sshd\[15388\]: Invalid user pcap from 217.76.158.124 port 36552
Dec 26 00:37:01 localhost sshd\[15388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.76.158.124
Dec 26 00:37:03 localhost sshd\[15388\]: Failed password for invalid user pcap from 217.76.158.124 port 36552 ssh2
2019-12-26 09:24:40
106.13.98.119 attack
Dec 25 19:17:13 plusreed sshd[2555]: Invalid user fukui from 106.13.98.119
...
2019-12-26 09:01:49
192.99.28.247 attackspambots
Invalid user skeoch from 192.99.28.247 port 48923
2019-12-26 09:07:09
152.136.115.150 attackbots
Dec 23 07:58:13 newdogma sshd[31850]: Invalid user straub from 152.136.115.150 port 37682
Dec 23 07:58:13 newdogma sshd[31850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.115.150
Dec 23 07:58:15 newdogma sshd[31850]: Failed password for invalid user straub from 152.136.115.150 port 37682 ssh2
Dec 23 07:58:16 newdogma sshd[31850]: Received disconnect from 152.136.115.150 port 37682:11: Bye Bye [preauth]
Dec 23 07:58:16 newdogma sshd[31850]: Disconnected from 152.136.115.150 port 37682 [preauth]
Dec 23 08:09:55 newdogma sshd[32082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.115.150  user=r.r
Dec 23 08:09:57 newdogma sshd[32082]: Failed password for r.r from 152.136.115.150 port 47050 ssh2
Dec 23 08:09:58 newdogma sshd[32082]: Received disconnect from 152.136.115.150 port 47050:11: Bye Bye [preauth]
Dec 23 08:09:58 newdogma sshd[32082]: Disconnected from 152.136.115.1........
-------------------------------
2019-12-26 09:14:12
62.231.127.86 attackspambots
Automatic report - Port Scan Attack
2019-12-26 09:14:28
62.28.34.125 attack
Dec 26 00:29:11 marvibiene sshd[45253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.28.34.125  user=root
Dec 26 00:29:13 marvibiene sshd[45253]: Failed password for root from 62.28.34.125 port 61727 ssh2
Dec 26 00:48:35 marvibiene sshd[45404]: Invalid user bicho from 62.28.34.125 port 25847
...
2019-12-26 09:24:59
51.38.71.36 attackbotsspam
Dec 25 18:32:00 : SSH login attempts with invalid user
2019-12-26 09:14:44
43.247.40.254 attackspam
Port scan: Attack repeated for 24 hours
2019-12-26 09:12:57

Recently Reported IPs

165.116.174.50 138.52.207.132 220.135.109.171 131.198.241.183
159.159.214.209 213.154.241.218 238.84.219.244 52.58.11.91
76.89.153.182 220.69.171.188 211.147.206.231 73.45.65.97
242.255.192.151 202.40.217.248 212.170.29.191 21.157.248.191
36.249.117.167 44.58.240.248 31.158.64.128 64.198.87.45