Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.139.27.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57617
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.139.27.108.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 23:22:52 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 108.27.139.130.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 108.27.139.130.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
106.75.141.202 attackspam
2020-08-26T15:40:42.977935lavrinenko.info sshd[29907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.141.202
2020-08-26T15:40:42.972539lavrinenko.info sshd[29907]: Invalid user andy from 106.75.141.202 port 60824
2020-08-26T15:40:44.688585lavrinenko.info sshd[29907]: Failed password for invalid user andy from 106.75.141.202 port 60824 ssh2
2020-08-26T15:43:37.374328lavrinenko.info sshd[29959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.141.202  user=root
2020-08-26T15:43:39.109975lavrinenko.info sshd[29959]: Failed password for root from 106.75.141.202 port 48750 ssh2
...
2020-08-26 21:00:46
156.204.98.89 attack
Port scan on 1 port(s): 1433
2020-08-26 21:03:48
183.157.10.76 attackbots
Aug 25 14:13:05 ns3 sshd[21825]: Failed password for invalid user yos from 183.157.10.76 port 37247 ssh2
Aug 25 14:16:33 ns3 sshd[22169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.157.10.76  user=r.r
Aug 25 14:16:34 ns3 sshd[22169]: Failed password for r.r from 183.157.10.76 port 35020 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=183.157.10.76
2020-08-26 21:21:47
51.83.97.44 attackspam
Aug 26 14:30:39 h1745522 sshd[23139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.97.44  user=root
Aug 26 14:30:42 h1745522 sshd[23139]: Failed password for root from 51.83.97.44 port 59676 ssh2
Aug 26 14:34:16 h1745522 sshd[23803]: Invalid user vvk from 51.83.97.44 port 38238
Aug 26 14:34:16 h1745522 sshd[23803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.97.44
Aug 26 14:34:16 h1745522 sshd[23803]: Invalid user vvk from 51.83.97.44 port 38238
Aug 26 14:34:18 h1745522 sshd[23803]: Failed password for invalid user vvk from 51.83.97.44 port 38238 ssh2
Aug 26 14:37:51 h1745522 sshd[24288]: Invalid user webuser from 51.83.97.44 port 45040
Aug 26 14:37:51 h1745522 sshd[24288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.97.44
Aug 26 14:37:51 h1745522 sshd[24288]: Invalid user webuser from 51.83.97.44 port 45040
Aug 26 14:37:53 h1745522 sshd[2
...
2020-08-26 21:05:03
120.92.72.190 attackbots
2020-08-26T13:10:22.933387shield sshd\[24715\]: Invalid user bro from 120.92.72.190 port 55227
2020-08-26T13:10:22.940616shield sshd\[24715\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.72.190
2020-08-26T13:10:25.348838shield sshd\[24715\]: Failed password for invalid user bro from 120.92.72.190 port 55227 ssh2
2020-08-26T13:15:10.137582shield sshd\[25515\]: Invalid user lam from 120.92.72.190 port 62284
2020-08-26T13:15:10.162708shield sshd\[25515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.72.190
2020-08-26 21:32:41
64.40.230.49 attackbotsspam
Aug 26 14:49:50 vps647732 sshd[19251]: Failed password for root from 64.40.230.49 port 53572 ssh2
...
2020-08-26 20:53:57
125.141.139.29 attackspambots
Time:     Wed Aug 26 12:53:51 2020 +0000
IP:       125.141.139.29 (-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Aug 26 12:43:22 ca-16-ede1 sshd[26073]: Invalid user radio from 125.141.139.29 port 35920
Aug 26 12:43:23 ca-16-ede1 sshd[26073]: Failed password for invalid user radio from 125.141.139.29 port 35920 ssh2
Aug 26 12:50:00 ca-16-ede1 sshd[26908]: Invalid user kun from 125.141.139.29 port 43872
Aug 26 12:50:03 ca-16-ede1 sshd[26908]: Failed password for invalid user kun from 125.141.139.29 port 43872 ssh2
Aug 26 12:53:47 ca-16-ede1 sshd[27398]: Invalid user charles from 125.141.139.29 port 33468
2020-08-26 21:07:07
189.85.146.85 attackbots
Aug 26 14:37:33 vpn01 sshd[11835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.85.146.85
Aug 26 14:37:35 vpn01 sshd[11835]: Failed password for invalid user wacos from 189.85.146.85 port 43942 ssh2
...
2020-08-26 21:20:30
102.176.81.99 attack
Aug 26 14:34:32 meumeu sshd[355811]: Invalid user tx from 102.176.81.99 port 52992
Aug 26 14:34:32 meumeu sshd[355811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.176.81.99 
Aug 26 14:34:32 meumeu sshd[355811]: Invalid user tx from 102.176.81.99 port 52992
Aug 26 14:34:34 meumeu sshd[355811]: Failed password for invalid user tx from 102.176.81.99 port 52992 ssh2
Aug 26 14:36:15 meumeu sshd[355934]: Invalid user yanglin from 102.176.81.99 port 37756
Aug 26 14:36:15 meumeu sshd[355934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.176.81.99 
Aug 26 14:36:15 meumeu sshd[355934]: Invalid user yanglin from 102.176.81.99 port 37756
Aug 26 14:36:17 meumeu sshd[355934]: Failed password for invalid user yanglin from 102.176.81.99 port 37756 ssh2
Aug 26 14:38:02 meumeu sshd[356029]: Invalid user password from 102.176.81.99 port 50736
...
2020-08-26 20:53:14
190.1.203.180 attackbotsspam
Aug 26 15:09:45 PorscheCustomer sshd[30613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.1.203.180
Aug 26 15:09:47 PorscheCustomer sshd[30613]: Failed password for invalid user user from 190.1.203.180 port 41082 ssh2
Aug 26 15:14:29 PorscheCustomer sshd[30719]: Failed password for root from 190.1.203.180 port 53282 ssh2
...
2020-08-26 21:31:04
145.239.69.74 attackbots
145.239.69.74 - - [26/Aug/2020:14:37:50 +0200] "GET /wp-login.php HTTP/1.1" 200 8537 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
145.239.69.74 - - [26/Aug/2020:14:37:52 +0200] "POST /wp-login.php HTTP/1.1" 200 8788 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
145.239.69.74 - - [26/Aug/2020:14:37:52 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-26 21:02:54
184.105.247.232 attackspambots
Hit honeypot r.
2020-08-26 21:20:45
186.250.95.186 attackspam
Aug 26 14:33:26 electroncash sshd[32575]: Failed password for invalid user factorio from 186.250.95.186 port 63695 ssh2
Aug 26 14:37:43 electroncash sshd[33735]: Invalid user aud from 186.250.95.186 port 23332
Aug 26 14:37:43 electroncash sshd[33735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.250.95.186 
Aug 26 14:37:43 electroncash sshd[33735]: Invalid user aud from 186.250.95.186 port 23332
Aug 26 14:37:45 electroncash sshd[33735]: Failed password for invalid user aud from 186.250.95.186 port 23332 ssh2
...
2020-08-26 21:12:54
183.82.121.34 attack
Aug 26 14:36:56 vps sshd[32471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.121.34 
Aug 26 14:36:58 vps sshd[32471]: Failed password for invalid user physics from 183.82.121.34 port 33844 ssh2
Aug 26 14:37:51 vps sshd[32520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.121.34 
...
2020-08-26 20:52:54
200.229.193.149 attackbotsspam
Aug 26 15:11:00 [host] sshd[11939]: Invalid user n
Aug 26 15:11:00 [host] sshd[11939]: pam_unix(sshd:
Aug 26 15:11:02 [host] sshd[11939]: Failed passwor
2020-08-26 21:17:51

Recently Reported IPs

107.30.191.183 206.221.141.45 230.163.136.105 97.188.15.36
12.220.232.103 172.8.21.92 203.213.203.27 114.234.210.18
71.131.156.244 159.63.199.61 107.125.58.248 78.85.244.225
167.230.211.2 40.153.227.222 180.168.44.214 179.4.71.162
25.205.217.62 52.163.251.7 169.249.1.76 26.96.218.246