Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: PT. First Media TBK

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspam
unauthorized connection attempt
2020-02-04 18:37:13
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.0.60.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30129
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.0.60.14.			IN	A

;; AUTHORITY SECTION:
.			396	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020400 1800 900 604800 86400

;; Query time: 51 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 18:37:07 CST 2020
;; MSG SIZE  rcvd: 115
Host info
14.60.0.139.in-addr.arpa domain name pointer fm-dyn-139-0-60-14.fast.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
14.60.0.139.in-addr.arpa	name = fm-dyn-139-0-60-14.fast.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
112.65.12.239 attackbots
Aug 24 13:25:38 mail kernel: \[3907173.993243\] \[UFW BLOCK\] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=112.65.12.239 DST=91.205.173.180 LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=27162 DF PROTO=TCP SPT=7177 DPT=1433 WINDOW=8192 RES=0x00 SYN URGP=0 
Aug 24 13:25:41 mail kernel: \[3907176.998655\] \[UFW BLOCK\] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=112.65.12.239 DST=91.205.173.180 LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=27461 DF PROTO=TCP SPT=7177 DPT=1433 WINDOW=8192 RES=0x00 SYN URGP=0 
Aug 24 13:30:25 mail kernel: \[3907460.944290\] \[UFW BLOCK\] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=112.65.12.239 DST=91.205.173.180 LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=27811 DF PROTO=TCP SPT=7284 DPT=65529 WINDOW=8192 RES=0x00 SYN URGP=0
2019-08-24 20:09:50
200.98.129.164 attackspam
firewall-block, port(s): 445/tcp
2019-08-24 20:00:01
67.55.92.88 attackspam
Aug 24 01:42:28 php1 sshd\[1467\]: Invalid user tuser from 67.55.92.88
Aug 24 01:42:28 php1 sshd\[1467\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.55.92.88
Aug 24 01:42:30 php1 sshd\[1467\]: Failed password for invalid user tuser from 67.55.92.88 port 54638 ssh2
Aug 24 01:46:28 php1 sshd\[1872\]: Invalid user razvan from 67.55.92.88
Aug 24 01:46:28 php1 sshd\[1872\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.55.92.88
2019-08-24 19:51:17
51.254.131.137 attackbotsspam
Splunk® : Brute-Force login attempt on SSH:
Aug 24 07:34:09 testbed sshd[31898]: Failed password for invalid user server from 51.254.131.137 port 51024 ssh2
2019-08-24 20:02:43
222.186.15.110 attack
Aug 24 06:47:44 aat-srv002 sshd[12446]: Failed password for root from 222.186.15.110 port 35513 ssh2
Aug 24 06:47:53 aat-srv002 sshd[12453]: Failed password for root from 222.186.15.110 port 63776 ssh2
Aug 24 06:48:02 aat-srv002 sshd[12455]: Failed password for root from 222.186.15.110 port 32296 ssh2
...
2019-08-24 19:48:30
212.83.185.121 attackspam
firewall-block, port(s): 5060/udp
2019-08-24 19:55:48
36.234.202.54 attackbotsspam
Aug 22 19:58:58 localhost kernel: [256153.536976] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=36.234.202.54 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=51 ID=6782 PROTO=TCP SPT=25950 DPT=37215 WINDOW=7465 RES=0x00 SYN URGP=0 
Aug 22 19:58:58 localhost kernel: [256153.536982] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=36.234.202.54 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=51 ID=6782 PROTO=TCP SPT=25950 DPT=37215 SEQ=758669438 ACK=0 WINDOW=7465 RES=0x00 SYN URGP=0 
Aug 23 21:10:44 localhost kernel: [346859.586800] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=36.234.202.54 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=51 ID=54574 PROTO=TCP SPT=25950 DPT=37215 WINDOW=7465 RES=0x00 SYN URGP=0 
Aug 23 21:10:44 localhost kernel: [346859.586823] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=36.234.202.54 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 T
2019-08-24 19:23:00
49.35.40.196 attackspam
Unauthorized connection attempt from IP address 49.35.40.196 on Port 445(SMB)
2019-08-24 19:52:30
121.128.200.146 attackbotsspam
Aug 24 12:30:27 MK-Soft-Root2 sshd\[392\]: Invalid user admin from 121.128.200.146 port 52590
Aug 24 12:30:27 MK-Soft-Root2 sshd\[392\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.128.200.146
Aug 24 12:30:29 MK-Soft-Root2 sshd\[392\]: Failed password for invalid user admin from 121.128.200.146 port 52590 ssh2
...
2019-08-24 19:23:58
75.134.60.130 attackspambots
2019-08-24T12:03:13.526775abusebot-2.cloudsearch.cf sshd\[31913\]: Invalid user 1 from 75.134.60.130 port 55990
2019-08-24 20:19:01
107.170.196.63 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2019-08-24 20:14:10
46.217.158.153 attack
Unauthorized connection attempt from IP address 46.217.158.153 on Port 445(SMB)
2019-08-24 19:53:21
116.55.97.116 attackbotsspam
Unauthorized connection attempt from IP address 116.55.97.116 on Port 445(SMB)
2019-08-24 20:17:45
106.13.23.91 attack
Aug 24 01:56:50 web9 sshd\[27181\]: Invalid user anthony from 106.13.23.91
Aug 24 01:56:50 web9 sshd\[27181\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.23.91
Aug 24 01:56:52 web9 sshd\[27181\]: Failed password for invalid user anthony from 106.13.23.91 port 47000 ssh2
Aug 24 01:59:51 web9 sshd\[27752\]: Invalid user lv from 106.13.23.91
Aug 24 01:59:51 web9 sshd\[27752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.23.91
2019-08-24 20:02:11
213.159.210.36 attackspam
Aug 24 00:21:00 ny01 sshd[15406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.159.210.36
Aug 24 00:21:01 ny01 sshd[15406]: Failed password for invalid user joeflores from 213.159.210.36 port 44760 ssh2
Aug 24 00:25:27 ny01 sshd[16478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.159.210.36
2019-08-24 19:18:00

Recently Reported IPs

90.106.146.250 49.232.15.34 39.104.54.218 27.3.64.104
1.52.118.172 222.137.120.70 187.188.141.41 178.137.93.115
178.137.17.146 178.74.11.19 172.105.13.100 171.35.11.227
171.4.242.208 159.203.42.130 139.189.241.251 125.162.88.85
123.188.25.57 122.118.218.113 122.118.127.37 121.11.240.105