Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: Washington

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
13.66.139.0 attackbots
log:/aero/meteo/UGEJ
2020-08-04 18:11:00
13.66.139.0 attackspambots
log:/meteo/biarritz_FR
2020-08-04 12:12:26
13.66.139.0 attackbotsspam
Automatic report - Banned IP Access
2020-06-18 18:33:16
13.66.139.0 attackbots
SQL injection attempt.
2020-03-26 01:53:48
13.66.139.0 attack
Automatic report - Banned IP Access
2020-02-08 20:47:57
13.66.139.0 attackbotsspam
Automatic report - Banned IP Access
2019-12-30 13:54:52
13.66.139.1 attackspam
Scanning unused Default website or suspicious access to valid sites from IP marked as abusive
2019-12-12 08:49:37
13.66.139.0 attackbotsspam
Port Scan: TCP/443
2019-10-18 16:42:50
13.66.139.1 attack
Brute force attack stopped by firewall
2019-09-25 08:59:37
13.66.139.0 attackbots
Port Scan: TCP/443
2019-09-20 23:10:20
13.66.139.1 attackspambots
Port Scan: TCP/443
2019-09-10 18:54:04
13.66.139.0 attackspambots
Port Scan: TCP/443
2019-09-03 03:27:03
13.66.139.0 attackspambots
Port Scan: TCP/443
2019-08-05 12:49:42
13.66.139.1 attack
Port Scan: TCP/80
2019-08-05 11:45:03
13.66.139.1 attackspambots
Brute force attack stopped by firewall
2019-07-05 10:11:11
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.66.139.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65236
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;13.66.139.140.			IN	A

;; AUTHORITY SECTION:
.			475	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020120601 1800 900 604800 86400

;; Query time: 101 msec
;; SERVER: 183.60.82.98#53(183.60.82.98)
;; WHEN: Mon Dec 07 07:43:48 CST 2020
;; MSG SIZE  rcvd: 117

Host info
140.139.66.13.in-addr.arpa domain name pointer msnbot-13-66-139-140.search.msn.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.139.66.13.in-addr.arpa	name = msnbot-13-66-139-140.search.msn.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.229.233.207 attackbots
Telnet Honeypot -> Telnet Bruteforce / Login
2020-06-27 04:34:34
178.128.70.61 attackbots
SSH auth scanning - multiple failed logins
2020-06-27 03:59:51
222.186.175.163 attack
Jun 26 22:16:55 * sshd[24734]: Failed password for root from 222.186.175.163 port 42838 ssh2
Jun 26 22:17:04 * sshd[24734]: Failed password for root from 222.186.175.163 port 42838 ssh2
2020-06-27 04:17:45
154.8.159.88 attack
Jun 26 22:08:33 OPSO sshd\[8777\]: Invalid user bridge from 154.8.159.88 port 46714
Jun 26 22:08:33 OPSO sshd\[8777\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.159.88
Jun 26 22:08:35 OPSO sshd\[8777\]: Failed password for invalid user bridge from 154.8.159.88 port 46714 ssh2
Jun 26 22:16:49 OPSO sshd\[10758\]: Invalid user ubuntu from 154.8.159.88 port 58306
Jun 26 22:16:49 OPSO sshd\[10758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.159.88
2020-06-27 04:35:45
161.97.74.223 attackbotsspam
Firewall Dropped Connection
2020-06-27 04:37:24
191.235.64.211 attackbots
Jun 25 00:38:38 main sshd[9744]: Failed password for invalid user alexander from 191.235.64.211 port 45029 ssh2
Jun 26 21:24:49 main sshd[5086]: Failed password for invalid user svccopssh from 191.235.64.211 port 33049 ssh2
2020-06-27 04:02:49
106.54.19.67 attack
Jun 26 22:27:14 ns381471 sshd[29681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.19.67
Jun 26 22:27:16 ns381471 sshd[29681]: Failed password for invalid user admin from 106.54.19.67 port 40660 ssh2
2020-06-27 04:34:12
206.189.199.48 attackspam
Jun 26 23:12:29 pkdns2 sshd\[14978\]: Invalid user deploy from 206.189.199.48Jun 26 23:12:31 pkdns2 sshd\[14978\]: Failed password for invalid user deploy from 206.189.199.48 port 56020 ssh2Jun 26 23:15:38 pkdns2 sshd\[15140\]: Invalid user lxc from 206.189.199.48Jun 26 23:15:40 pkdns2 sshd\[15140\]: Failed password for invalid user lxc from 206.189.199.48 port 54142 ssh2Jun 26 23:18:58 pkdns2 sshd\[15257\]: Failed password for mysql from 206.189.199.48 port 52430 ssh2Jun 26 23:22:14 pkdns2 sshd\[15442\]: Invalid user indra from 206.189.199.48
...
2020-06-27 04:26:52
111.231.77.115 attackspambots
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-06-27 04:28:18
103.45.104.36 attack
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-06-27 04:30:04
69.26.136.247 attack
nginx/honey/a4a6f
2020-06-27 04:10:10
118.24.11.226 attackspambots
Jun 26 22:21:09 localhost sshd\[25065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.11.226  user=root
Jun 26 22:21:11 localhost sshd\[25065\]: Failed password for root from 118.24.11.226 port 38832 ssh2
Jun 26 22:23:45 localhost sshd\[25138\]: Invalid user cosmo from 118.24.11.226
Jun 26 22:23:45 localhost sshd\[25138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.11.226
Jun 26 22:23:47 localhost sshd\[25138\]: Failed password for invalid user cosmo from 118.24.11.226 port 41272 ssh2
...
2020-06-27 04:27:43
109.244.101.166 attack
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-06-27 04:21:16
182.76.74.78 attack
Jun 26 21:58:56 abendstille sshd\[4375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.76.74.78  user=root
Jun 26 21:58:59 abendstille sshd\[4375\]: Failed password for root from 182.76.74.78 port 6449 ssh2
Jun 26 22:03:32 abendstille sshd\[10763\]: Invalid user hl from 182.76.74.78
Jun 26 22:03:32 abendstille sshd\[10763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.76.74.78
Jun 26 22:03:34 abendstille sshd\[10763\]: Failed password for invalid user hl from 182.76.74.78 port 37630 ssh2
...
2020-06-27 04:09:54
175.24.19.210 attack
Jun 26 19:58:37 ip-172-31-62-245 sshd\[1792\]: Invalid user tianyu from 175.24.19.210\
Jun 26 19:58:39 ip-172-31-62-245 sshd\[1792\]: Failed password for invalid user tianyu from 175.24.19.210 port 33376 ssh2\
Jun 26 20:01:29 ip-172-31-62-245 sshd\[1824\]: Invalid user huangjl from 175.24.19.210\
Jun 26 20:01:31 ip-172-31-62-245 sshd\[1824\]: Failed password for invalid user huangjl from 175.24.19.210 port 39492 ssh2\
Jun 26 20:04:27 ip-172-31-62-245 sshd\[1860\]: Invalid user anderson from 175.24.19.210\
2020-06-27 04:12:27

Recently Reported IPs

189.91.128.108 10.213.34.3 190.104.131.110 35.132.189.144
103.73.35.182 87.251.75.94 91.239.190.12 94.153.3.164
14.207.123.1 31.0.176.215 101.26.223.199 203.151.133.54
147.92.165.66 150.249.251.210 150.249.251.232 36.66.218.205
218.47.69.247 113.149.158.17 202.243.87.147 153.131.242.91