Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tangerang

Region: Banten

Country: Indonesia

Internet Service Provider: Esia

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.0.187.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9587
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.0.187.132.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:03:09 CST 2022
;; MSG SIZE  rcvd: 106
Host info
132.187.0.139.in-addr.arpa domain name pointer fm-dyn-139-0-187-132.fast.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
132.187.0.139.in-addr.arpa	name = fm-dyn-139-0-187-132.fast.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
118.70.81.202 attackspam
Unauthorized connection attempt from IP address 118.70.81.202 on Port 445(SMB)
2019-06-25 21:51:36
63.240.240.74 attackbotsspam
25.06.2019 06:53:56 SSH access blocked by firewall
2019-06-25 21:38:04
82.18.200.252 attack
Web Probe / Attack
2019-06-25 21:37:20
117.216.160.6 attackspambots
Unauthorized connection attempt from IP address 117.216.160.6 on Port 445(SMB)
2019-06-25 21:58:21
218.92.0.198 attack
Jun 25 16:54:26 srv-4 sshd\[14005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.198  user=root
Jun 25 16:54:28 srv-4 sshd\[14005\]: Failed password for root from 218.92.0.198 port 11379 ssh2
Jun 25 16:55:35 srv-4 sshd\[14105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.198  user=root
...
2019-06-25 22:33:00
189.91.3.179 attackspambots
SMTP-sasl brute force
...
2019-06-25 22:20:46
178.205.130.253 attackbots
Wordpress attack
2019-06-25 21:45:05
14.231.145.0 attackbots
Unauthorized connection attempt from IP address 14.231.145.0 on Port 445(SMB)
2019-06-25 22:03:56
125.209.85.196 attack
Unauthorized connection attempt from IP address 125.209.85.196 on Port 445(SMB)
2019-06-25 22:26:58
185.176.27.118 attackspambots
25.06.2019 12:54:28 Connection to port 3050 blocked by firewall
2019-06-25 21:56:32
180.121.90.40 attack
2019-06-25T06:36:25.295559 X postfix/smtpd[11524]: warning: unknown[180.121.90.40]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-25T08:52:29.452797 X postfix/smtpd[30084]: warning: unknown[180.121.90.40]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-25T08:52:46.336848 X postfix/smtpd[30084]: warning: unknown[180.121.90.40]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-25 21:47:03
110.78.183.114 attackspambots
Unauthorized connection attempt from IP address 110.78.183.114 on Port 445(SMB)
2019-06-25 21:43:28
165.22.249.42 attack
$f2bV_matches
2019-06-25 22:09:40
168.194.140.130 attackspambots
Automated report - ssh fail2ban:
Jun 25 15:26:36 authentication failure 
Jun 25 15:26:38 wrong password, user=hschoi, port=41154, ssh2
Jun 25 15:30:27 authentication failure
2019-06-25 21:48:45
203.171.227.205 attackbots
Jun 25 15:03:47 h2177944 sshd\[12407\]: Invalid user sonhn from 203.171.227.205 port 50619
Jun 25 15:03:47 h2177944 sshd\[12407\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.171.227.205
Jun 25 15:03:49 h2177944 sshd\[12407\]: Failed password for invalid user sonhn from 203.171.227.205 port 50619 ssh2
Jun 25 15:06:00 h2177944 sshd\[12430\]: Invalid user pisica from 203.171.227.205 port 58807
...
2019-06-25 22:04:33

Recently Reported IPs

139.0.192.198 139.0.193.239 139.0.193.136 139.0.193.197
139.0.20.235 139.0.204.77 139.0.195.112 139.0.204.255
139.0.20.114 139.0.205.19 139.0.21.58 118.209.249.14
139.0.22.178 139.0.199.141 139.0.222.18 139.0.222.201
139.0.22.18 139.0.23.188 139.0.22.50 139.0.23.114