Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Jakarta

Region: Jakarta

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.0.29.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 917
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.0.29.19.			IN	A

;; AUTHORITY SECTION:
.			519	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:03:23 CST 2022
;; MSG SIZE  rcvd: 104
Host info
19.29.0.139.in-addr.arpa domain name pointer ln-static-139-0-29-19.link.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
19.29.0.139.in-addr.arpa	name = ln-static-139-0-29-19.link.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
112.65.127.154 attackspambots
29.06.2019 02:18:58 SSH access blocked by firewall
2019-06-29 10:32:26
162.144.89.205 attackbots
" "
2019-06-29 10:55:32
185.142.236.34 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-06-29 10:18:31
45.125.65.77 attackbotsspam
2019-06-28T23:40:11.808198ns1.unifynetsol.net postfix/smtpd\[19058\]: warning: unknown\[45.125.65.77\]: SASL LOGIN authentication failed: authentication failure
2019-06-29T01:04:14.923800ns1.unifynetsol.net postfix/smtpd\[6280\]: warning: unknown\[45.125.65.77\]: SASL LOGIN authentication failed: authentication failure
2019-06-29T02:28:47.217248ns1.unifynetsol.net postfix/smtpd\[18680\]: warning: unknown\[45.125.65.77\]: SASL LOGIN authentication failed: authentication failure
2019-06-29T03:53:06.536114ns1.unifynetsol.net postfix/smtpd\[26981\]: warning: unknown\[45.125.65.77\]: SASL LOGIN authentication failed: authentication failure
2019-06-29T05:17:25.143625ns1.unifynetsol.net postfix/smtpd\[6735\]: warning: unknown\[45.125.65.77\]: SASL LOGIN authentication failed: authentication failure
2019-06-29 10:26:55
62.210.81.107 attackbots
C1,WP GET /suche/wp-login.php
2019-06-29 10:22:19
124.113.219.99 attackbots
IP: 124.113.219.99
ASN: AS4134 No.31 Jin-rong Street
Port: Simple Mail Transfer 25
Date: 28/06/2019 11:20:24 PM UTC
2019-06-29 10:20:39
129.213.97.191 attack
Jun 29 04:31:06 amit sshd\[31394\]: Invalid user user from 129.213.97.191
Jun 29 04:31:06 amit sshd\[31394\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.97.191
Jun 29 04:31:08 amit sshd\[31394\]: Failed password for invalid user user from 129.213.97.191 port 44380 ssh2
...
2019-06-29 10:47:32
37.99.132.139 attack
firewall-block, port(s): 445/tcp
2019-06-29 10:37:45
185.234.218.173 attack
IP: 185.234.218.173
ASN: AS197226 sprint S.A.
Port: Simple Mail Transfer 25
Found in one or more Blacklists
Date: 29/06/2019 1:48:32 AM UTC
2019-06-29 10:31:25
191.53.195.41 attackspam
SMTP-sasl brute force
...
2019-06-29 10:57:16
182.61.21.197 attack
[ssh] SSH attack
2019-06-29 11:00:48
37.1.216.49 attackbots
firewall-block, port(s): 445/tcp
2019-06-29 10:38:29
5.9.70.113 attackspam
IP: 5.9.70.113
ASN: AS24940 Hetzner Online GmbH
Port: World Wide Web HTTP 80
Date: 28/06/2019 11:20:23 PM UTC
2019-06-29 10:21:22
200.23.235.87 attackspam
SMTP-sasl brute force
...
2019-06-29 10:52:23
165.227.1.117 attackspambots
Jun 29 01:18:59 [host] sshd[29659]: Invalid user ionut from 165.227.1.117
Jun 29 01:18:59 [host] sshd[29659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.1.117
Jun 29 01:19:01 [host] sshd[29659]: Failed password for invalid user ionut from 165.227.1.117 port 56998 ssh2
2019-06-29 10:59:42

Recently Reported IPs

139.0.29.20 139.0.29.99 139.0.29.42 118.21.145.111
139.0.32.233 139.0.34.0 139.0.43.237 139.0.5.202
139.0.5.74 139.0.5.203 118.21.155.167 139.0.52.153
139.0.52.247 139.0.51.40 139.0.53.1 139.0.52.100
139.0.52.23 139.0.53.126 139.0.54.168 139.0.56.168