Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: Washington

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
13.66.139.0 attackbots
log:/aero/meteo/UGEJ
2020-08-04 18:11:00
13.66.139.0 attackspambots
log:/meteo/biarritz_FR
2020-08-04 12:12:26
13.66.139.0 attackbotsspam
Automatic report - Banned IP Access
2020-06-18 18:33:16
13.66.139.0 attackbots
SQL injection attempt.
2020-03-26 01:53:48
13.66.139.0 attack
Automatic report - Banned IP Access
2020-02-08 20:47:57
13.66.139.0 attackbotsspam
Automatic report - Banned IP Access
2019-12-30 13:54:52
13.66.139.1 attackspam
Scanning unused Default website or suspicious access to valid sites from IP marked as abusive
2019-12-12 08:49:37
13.66.139.0 attackbotsspam
Port Scan: TCP/443
2019-10-18 16:42:50
13.66.139.1 attack
Brute force attack stopped by firewall
2019-09-25 08:59:37
13.66.139.0 attackbots
Port Scan: TCP/443
2019-09-20 23:10:20
13.66.139.1 attackspambots
Port Scan: TCP/443
2019-09-10 18:54:04
13.66.139.0 attackspambots
Port Scan: TCP/443
2019-09-03 03:27:03
13.66.139.0 attackspambots
Port Scan: TCP/443
2019-08-05 12:49:42
13.66.139.1 attack
Port Scan: TCP/80
2019-08-05 11:45:03
13.66.139.1 attackspambots
Brute force attack stopped by firewall
2019-07-05 10:11:11
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.66.139.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55784
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;13.66.139.2.			IN	A

;; AUTHORITY SECTION:
.			117	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020103101 1800 900 604800 86400

;; Query time: 112 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 01 09:08:16 CST 2020
;; MSG SIZE  rcvd: 115
Host info
2.139.66.13.in-addr.arpa domain name pointer msnbot-13-66-139-2.search.msn.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
2.139.66.13.in-addr.arpa	name = msnbot-13-66-139-2.search.msn.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
206.189.18.109 attackbots
WordPress brute force
2020-06-17 07:59:43
45.232.9.37 attackbots
Attempted connection to port 445.
2020-06-17 08:31:03
31.24.144.113 attackbots
C1,DEF GET /wp-login.php
2020-06-17 07:57:15
181.95.23.250 attackspambots
Zyxel Multiple Products Command Injection Vulnerability
2020-06-17 08:29:21
207.244.247.251 attackbots
SSHD unauthorised connection attempt (a)
2020-06-17 08:21:59
61.177.172.41 attack
2020-06-17T02:02:42.838870struts4.enskede.local sshd\[22905\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.41  user=root
2020-06-17T02:02:46.893644struts4.enskede.local sshd\[22905\]: Failed password for root from 61.177.172.41 port 40861 ssh2
2020-06-17T02:02:50.955908struts4.enskede.local sshd\[22905\]: Failed password for root from 61.177.172.41 port 40861 ssh2
2020-06-17T02:02:55.868187struts4.enskede.local sshd\[22905\]: Failed password for root from 61.177.172.41 port 40861 ssh2
2020-06-17T02:02:59.294431struts4.enskede.local sshd\[22905\]: Failed password for root from 61.177.172.41 port 40861 ssh2
...
2020-06-17 08:03:29
78.101.163.205 attackspam
Zyxel Multiple Products Command Injection Vulnerability
2020-06-17 08:27:28
111.229.103.45 attackbotsspam
$f2bV_matches
2020-06-17 08:21:18
118.68.122.35 attackspambots
Unauthorized connection attempt from IP address 118.68.122.35 on Port 445(SMB)
2020-06-17 07:56:48
159.65.155.255 attack
Jun 17 02:00:57 piServer sshd[14832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.155.255 
Jun 17 02:00:59 piServer sshd[14832]: Failed password for invalid user minerva from 159.65.155.255 port 45852 ssh2
Jun 17 02:04:32 piServer sshd[15154]: Failed password for root from 159.65.155.255 port 46738 ssh2
...
2020-06-17 08:05:02
125.82.33.37 attack
Netgear DGN Device Remote Command Execution Vulnerability
2020-06-17 08:23:16
187.214.53.137 attack
Honeypot attack, port: 81, PTR: dsl-187-214-53-137-dyn.prod-infinitum.com.mx.
2020-06-17 08:09:47
158.177.123.155 attackbotsspam
CMS (WordPress or Joomla) login attempt.
2020-06-17 08:29:37
5.101.107.183 attackbotsspam
2020-06-17T01:48:41.282009rocketchat.forhosting.nl sshd[15690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.101.107.183
2020-06-17T01:48:41.279625rocketchat.forhosting.nl sshd[15690]: Invalid user zsh from 5.101.107.183 port 49260
2020-06-17T01:48:43.528700rocketchat.forhosting.nl sshd[15690]: Failed password for invalid user zsh from 5.101.107.183 port 49260 ssh2
...
2020-06-17 08:14:17
182.75.131.106 attack
Unauthorized connection attempt from IP address 182.75.131.106 on Port 445(SMB)
2020-06-17 08:03:12

Recently Reported IPs

3.137.168.188 177.236.56.70 76.119.65.144 59.92.202.223
42.106.180.175 117.230.94.33 126.208.154.150 102.45.90.225
196.156.143.76 157.40.22.222 98.143.208.222 107.137.34.70
107.242.121.58 46.48.160.184 189.249.129.45 109.184.234.63
189.62.149.153 133.32.224.19 125.133.219.177 59.17.84.51