Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Sukoharjo

Region: Central Java

Country: Indonesia

Internet Service Provider: Esia

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.0.51.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51702
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.0.51.40.			IN	A

;; AUTHORITY SECTION:
.			498	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 90 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:03:27 CST 2022
;; MSG SIZE  rcvd: 104
Host info
40.51.0.139.in-addr.arpa domain name pointer fm-dyn-139-0-51-40.fast.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
40.51.0.139.in-addr.arpa	name = fm-dyn-139-0-51-40.fast.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
178.128.242.233 attackspambots
Dec  3 00:36:11 sso sshd[9717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.242.233
Dec  3 00:36:13 sso sshd[9717]: Failed password for invalid user Linda from 178.128.242.233 port 47896 ssh2
...
2019-12-03 08:30:56
203.160.62.115 attack
no
2019-12-03 08:34:54
69.176.95.240 attackbots
Dec  3 05:03:34 XXX sshd[28761]: Invalid user quest from 69.176.95.240 port 45519
2019-12-03 13:04:13
51.15.84.255 attack
2019-12-03T00:41:58.806707  sshd[30610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.84.255  user=root
2019-12-03T00:42:00.670549  sshd[30610]: Failed password for root from 51.15.84.255 port 59480 ssh2
2019-12-03T00:48:42.341948  sshd[30735]: Invalid user masuka from 51.15.84.255 port 43158
2019-12-03T00:48:42.357122  sshd[30735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.84.255
2019-12-03T00:48:42.341948  sshd[30735]: Invalid user masuka from 51.15.84.255 port 43158
2019-12-03T00:48:44.015512  sshd[30735]: Failed password for invalid user masuka from 51.15.84.255 port 43158 ssh2
...
2019-12-03 08:19:55
129.211.41.162 attack
Dec  2 22:32:04 srv01 sshd[22289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.41.162  user=news
Dec  2 22:32:06 srv01 sshd[22289]: Failed password for news from 129.211.41.162 port 55158 ssh2
Dec  2 22:37:54 srv01 sshd[22812]: Invalid user smmsp from 129.211.41.162 port 38312
Dec  2 22:37:54 srv01 sshd[22812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.41.162
Dec  2 22:37:54 srv01 sshd[22812]: Invalid user smmsp from 129.211.41.162 port 38312
Dec  2 22:37:56 srv01 sshd[22812]: Failed password for invalid user smmsp from 129.211.41.162 port 38312 ssh2
...
2019-12-03 08:37:06
123.30.236.149 attackspambots
Dec  3 01:16:20 OPSO sshd\[2424\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.236.149  user=root
Dec  3 01:16:22 OPSO sshd\[2424\]: Failed password for root from 123.30.236.149 port 55730 ssh2
Dec  3 01:23:05 OPSO sshd\[3971\]: Invalid user saravanos from 123.30.236.149 port 58882
Dec  3 01:23:05 OPSO sshd\[3971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.236.149
Dec  3 01:23:07 OPSO sshd\[3971\]: Failed password for invalid user saravanos from 123.30.236.149 port 58882 ssh2
2019-12-03 08:32:13
181.55.95.52 attackspam
Dec  3 04:50:18 hcbbdb sshd\[16874\]: Invalid user ey from 181.55.95.52
Dec  3 04:50:18 hcbbdb sshd\[16874\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.55.95.52
Dec  3 04:50:20 hcbbdb sshd\[16874\]: Failed password for invalid user ey from 181.55.95.52 port 48767 ssh2
Dec  3 04:56:48 hcbbdb sshd\[17587\]: Invalid user home from 181.55.95.52
Dec  3 04:56:48 hcbbdb sshd\[17587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.55.95.52
2019-12-03 13:01:44
13.56.223.168 attackspambots
Brute forcing RDP port 3389
2019-12-03 08:11:27
140.246.124.36 attackbots
Dec  3 01:14:24 ns41 sshd[14060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.246.124.36
2019-12-03 08:41:36
122.160.122.49 attackspambots
2019-12-02T22:28:58.852104struts4.enskede.local sshd\[19368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.160.122.49  user=root
2019-12-02T22:29:01.874671struts4.enskede.local sshd\[19368\]: Failed password for root from 122.160.122.49 port 34098 ssh2
2019-12-02T22:35:48.562312struts4.enskede.local sshd\[19422\]: Invalid user teru from 122.160.122.49 port 45652
2019-12-02T22:35:48.571997struts4.enskede.local sshd\[19422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.160.122.49
2019-12-02T22:35:52.023461struts4.enskede.local sshd\[19422\]: Failed password for invalid user teru from 122.160.122.49 port 45652 ssh2
...
2019-12-03 08:18:08
220.86.166.7 attackspambots
Dec  3 00:00:33 hcbbdb sshd\[14036\]: Invalid user webmaster from 220.86.166.7
Dec  3 00:00:33 hcbbdb sshd\[14036\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.86.166.7
Dec  3 00:00:35 hcbbdb sshd\[14036\]: Failed password for invalid user webmaster from 220.86.166.7 port 44264 ssh2
Dec  3 00:07:11 hcbbdb sshd\[14923\]: Invalid user lodal from 220.86.166.7
Dec  3 00:07:11 hcbbdb sshd\[14923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.86.166.7
2019-12-03 08:08:53
200.13.195.70 attackbots
SSH Brute Force, server-1 sshd[32605]: Failed password for root from 200.13.195.70 port 57706 ssh2
2019-12-03 08:31:43
218.153.159.198 attack
CyberHackers.eu > SSH Bruteforce attempt!
2019-12-03 08:08:03
218.92.0.157 attackspam
Dec  3 05:56:36 minden010 sshd[24728]: Failed password for root from 218.92.0.157 port 5748 ssh2
Dec  3 05:56:39 minden010 sshd[24728]: Failed password for root from 218.92.0.157 port 5748 ssh2
Dec  3 05:56:43 minden010 sshd[24728]: Failed password for root from 218.92.0.157 port 5748 ssh2
Dec  3 05:56:47 minden010 sshd[24728]: Failed password for root from 218.92.0.157 port 5748 ssh2
...
2019-12-03 13:00:19
111.231.144.219 attack
Dec  3 01:15:14 legacy sshd[19861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.144.219
Dec  3 01:15:16 legacy sshd[19861]: Failed password for invalid user server from 111.231.144.219 port 44732 ssh2
Dec  3 01:21:45 legacy sshd[20208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.144.219
...
2019-12-03 08:26:06

Recently Reported IPs

139.0.52.247 139.0.53.1 139.0.52.100 139.0.52.23
139.0.53.126 139.0.54.168 139.0.56.168 139.0.6.250
139.0.6.36 118.21.26.226 139.0.6.44 139.0.6.42
139.0.67.9 139.0.80.3 139.0.6.46 139.0.80.97
139.0.78.158 118.21.39.210 118.21.57.94 118.210.123.46