Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Jakarta

Region: Jakarta

Country: Indonesia

Internet Service Provider: PT. First Media TBK

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspambots
Registration form abuse
2019-10-08 03:34:49
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.0.42.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62461
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.0.42.197.			IN	A

;; AUTHORITY SECTION:
.			60	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019100702 1800 900 604800 86400

;; Query time: 429 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 08 03:34:44 CST 2019
;; MSG SIZE  rcvd: 116
Host info
197.42.0.139.in-addr.arpa domain name pointer fm-dyn-139-0-42-197.fast.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
197.42.0.139.in-addr.arpa	name = fm-dyn-139-0-42-197.fast.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
115.217.103.185 attackspam
Request: "POST /wp-login.php HTTP/1.1" Request: "POST /wp-login.php HTTP/1.1" Request: "POST /wp-login.php HTTP/1.1" Request: "POST /wp-login.php HTTP/1.1"
2019-06-22 05:30:22
42.239.90.69 attackspambots
DATE:2019-06-21_21:45:00, IP:42.239.90.69, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-06-22 05:40:55
18.215.155.208 attack
Request: "GET / HTTP/1.1"
2019-06-22 05:36:35
164.132.56.243 attackspambots
Attempted SSH login
2019-06-22 05:46:00
177.234.21.166 attack
445/tcp
[2019-06-21]1pkt
2019-06-22 05:50:09
185.36.81.175 attackspambots
Jun 21 20:53:43  postfix/smtpd: warning: unknown[185.36.81.175]: SASL LOGIN authentication failed
2019-06-22 05:18:14
219.157.239.119 attackspambots
23/tcp
[2019-06-21]1pkt
2019-06-22 05:34:45
165.22.143.229 attack
web-1 [ssh] SSH Attack
2019-06-22 05:37:02
42.52.83.21 attackspam
5500/tcp
[2019-06-21]1pkt
2019-06-22 05:25:20
107.170.202.120 attack
Bad Bot Bad Request: "GET / HTTP/1.1" Agent: "Mozilla/5.0 zgrab/0.x"
2019-06-22 05:23:00
188.136.205.223 attackbots
Request: "GET / HTTP/1.1"
2019-06-22 05:45:36
103.78.74.254 attackspam
445/tcp 445/tcp 445/tcp
[2019-06-21]3pkt
2019-06-22 05:15:14
115.76.94.115 attackspam
445/tcp
[2019-06-21]1pkt
2019-06-22 05:39:09
191.255.192.212 attackbots
Request: "GET / HTTP/1.1"
2019-06-22 05:39:31
111.67.196.127 attackspam
Bad Bot Bad Request: "GET / HTTP/1.1" Agent: "Mozilla/5.0 zgrab/0.x" Bad Bot Bad Request: "GET / HTTP/1.1" Agent: "Mozilla/5.0 zgrab/0.x" Bad Bot Bad Request: "GET / HTTP/1.1" Agent: "Mozilla/5.0 zgrab/0.x"
2019-06-22 05:18:39

Recently Reported IPs

188.2.115.147 95.83.118.248 121.228.207.150 204.181.222.155
208.252.33.234 122.113.56.56 73.26.9.150 178.55.155.204
218.24.153.189 210.3.22.8 23.16.98.91 14.127.11.147
71.30.10.128 112.137.107.181 159.203.201.154 172.248.22.206
99.70.155.119 203.208.60.83 104.230.157.15 129.211.141.41