Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bogor

Region: West Java

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
139.0.233.220 attackspam
IP: 139.0.233.220
ASN: AS23700 Linknet-Fastnet ASN
Port: Simple Mail Transfer 25
Found in one or more Blacklists
Date: 28/07/2019 1:13:42 AM UTC
2019-07-28 11:30:12
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.0.23.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59586
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.0.23.114.			IN	A

;; AUTHORITY SECTION:
.			597	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 77 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:03:15 CST 2022
;; MSG SIZE  rcvd: 105
Host info
114.23.0.139.in-addr.arpa domain name pointer ln-static-139-0-23-114.link.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
114.23.0.139.in-addr.arpa	name = ln-static-139-0-23-114.link.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
186.234.80.235 attackbotsspam
186.234.80.235 - - [03/Jun/2020:04:50:24 +0100] "POST /wp-login.php HTTP/1.1" 200 1875 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
186.234.80.235 - - [03/Jun/2020:04:50:26 +0100] "POST /wp-login.php HTTP/1.1" 200 1860 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
186.234.80.235 - - [03/Jun/2020:04:50:27 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-06-03 17:50:48
210.245.108.193 attackbotsspam
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-06-03 17:23:05
173.244.209.5 attackbots
US_Hosting_<177>1591173490 [1:2522026:4082] ET TOR Known Tor Relay/Router (Not Exit) Node TCP Traffic group 27 [Classification: Misc Attack] [Priority: 2]:  {TCP} 173.244.209.5:55714
2020-06-03 17:32:55
119.29.227.108 attackbotsspam
SSH Brute-Forcing (server2)
2020-06-03 17:48:25
58.250.164.246 attack
DATE:2020-06-03 07:38:23, IP:58.250.164.246, PORT:ssh SSH brute force auth (docker-dc)
2020-06-03 17:26:45
200.89.154.99 attackspambots
$f2bV_matches
2020-06-03 17:50:20
129.211.85.214 attackspam
Jun  3 06:51:38 minden010 sshd[2894]: Failed password for root from 129.211.85.214 port 44092 ssh2
Jun  3 06:53:51 minden010 sshd[3738]: Failed password for root from 129.211.85.214 port 39686 ssh2
...
2020-06-03 17:26:30
116.203.26.163 attackbots
2020-06-03T06:47:08.845502mail.standpoint.com.ua sshd[27924]: Failed password for root from 116.203.26.163 port 25082 ssh2
2020-06-03T06:49:13.405242mail.standpoint.com.ua sshd[28217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.203.26.163  user=root
2020-06-03T06:49:15.902800mail.standpoint.com.ua sshd[28217]: Failed password for root from 116.203.26.163 port 59152 ssh2
2020-06-03T06:51:26.269452mail.standpoint.com.ua sshd[28537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.203.26.163  user=root
2020-06-03T06:51:28.025473mail.standpoint.com.ua sshd[28537]: Failed password for root from 116.203.26.163 port 28710 ssh2
...
2020-06-03 17:14:14
13.228.47.114 attackbots
WordPress login Brute force / Web App Attack on client site.
2020-06-03 17:14:03
200.107.20.186 attackspam
Automatic report - XMLRPC Attack
2020-06-03 17:24:06
200.46.29.26 attack
Icarus honeypot on github
2020-06-03 17:14:44
107.180.123.10 attack
Automatic report - XMLRPC Attack
2020-06-03 17:25:02
123.201.164.172 attackbotsspam
Icarus honeypot on github
2020-06-03 17:54:33
118.122.92.219 attackbots
Jun  3 09:34:54 hell sshd[31728]: Failed password for root from 118.122.92.219 port 5584 ssh2
...
2020-06-03 17:17:04
89.187.178.158 attack
(From crawford.stella@yahoo.com) Would you like to post your business on 1000's of Advertising sites every month? One tiny investment every month will get you virtually endless traffic to your site forever!

For details check out: https://bit.ly/adpostingfast
2020-06-03 17:36:46

Recently Reported IPs

139.0.22.50 139.0.226.126 139.0.229.183 139.0.230.20
139.0.232.251 118.21.137.250 139.0.232.66 139.0.24.188
139.0.24.187 139.0.240.72 139.0.26.114 139.0.243.33
139.0.250.50 139.0.233.225 139.0.26.116 139.0.24.53
139.0.245.18 139.0.26.118 118.21.141.132 139.0.27.26