Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.0.55.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23926
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.0.55.46.			IN	A

;; AUTHORITY SECTION:
.			152	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 12:32:22 CST 2022
;; MSG SIZE  rcvd: 104
Host info
46.55.0.139.in-addr.arpa domain name pointer fm-dyn-139-0-55-46.fast.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
46.55.0.139.in-addr.arpa	name = fm-dyn-139-0-55-46.fast.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
118.25.152.231 attack
SSH Brute-Forcing (server1)
2020-06-23 08:39:21
45.95.169.61 attackbots
SpamScore above: 10.0
2020-06-23 08:41:25
46.161.27.75 attackspambots
Port scan
2020-06-23 08:25:34
114.237.109.234 attackspambots
Email spam message
2020-06-23 08:20:02
115.159.214.247 attackspambots
$f2bV_matches
2020-06-23 08:19:34
51.103.130.47 attackspam
51.103.128.59 - - [21/Jun/2020:06:39:53 -0300] "GET /.git/HEAD HTTP/1.1" 404 101 "-" "-"
51.103.130.47 - - [21/Jun/2020:15:33:43 -0300] "GET /.git/HEAD HTTP/1.1" 403 641 "-" "-"
2020-06-23 08:20:43
88.228.214.114 attackspambots
xmlrpc attack
2020-06-23 08:28:33
58.215.186.183 attackbots
SSH Brute Force
2020-06-23 08:16:06
222.186.52.39 attackspambots
Jun 23 05:59:38 eventyay sshd[16894]: Failed password for root from 222.186.52.39 port 43422 ssh2
Jun 23 05:59:40 eventyay sshd[16894]: Failed password for root from 222.186.52.39 port 43422 ssh2
Jun 23 05:59:42 eventyay sshd[16894]: Failed password for root from 222.186.52.39 port 43422 ssh2
...
2020-06-23 12:00:37
45.227.253.190 attackspambots
5 attempts against mh-modsecurity-ban on milky
2020-06-23 08:45:59
136.255.144.2 attackspam
Jun 23 05:54:08 localhost sshd\[18609\]: Invalid user test1 from 136.255.144.2
Jun 23 05:54:08 localhost sshd\[18609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.255.144.2
Jun 23 05:54:10 localhost sshd\[18609\]: Failed password for invalid user test1 from 136.255.144.2 port 43328 ssh2
Jun 23 05:58:13 localhost sshd\[18881\]: Invalid user mayank from 136.255.144.2
Jun 23 05:58:13 localhost sshd\[18881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.255.144.2
...
2020-06-23 12:08:08
34.82.254.168 attack
Jun 22 22:22:42 ns382633 sshd\[18321\]: Invalid user sekine from 34.82.254.168 port 51502
Jun 22 22:22:42 ns382633 sshd\[18321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.82.254.168
Jun 22 22:22:44 ns382633 sshd\[18321\]: Failed password for invalid user sekine from 34.82.254.168 port 51502 ssh2
Jun 22 22:33:37 ns382633 sshd\[20295\]: Invalid user caldera from 34.82.254.168 port 48484
Jun 22 22:33:37 ns382633 sshd\[20295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.82.254.168
2020-06-23 08:38:18
185.107.80.34 attackbots
ZGrab Application Layer Scanner Detection
2020-06-23 12:05:48
111.229.167.10 attack
prod6
...
2020-06-23 08:31:54
172.58.222.189 spambotsattackproxynormal
172.58.222.173
2020-06-23 11:08:14

Recently Reported IPs

139.0.48.181 138.99.7.27 139.0.6.34 139.0.6.84
139.104.192.37 139.0.84.45 139.104.36.53 139.112.168.16
139.0.85.24 139.0.72.48 139.101.166.25 139.104.72.33
139.129.140.243 139.129.12.166 139.129.140.5 139.129.140.4
139.129.140.246 139.129.141.54 139.129.142.211 139.129.141.250