Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.128.100.230
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26371
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.128.100.230.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024122100 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 21 20:49:12 CST 2024
;; MSG SIZE  rcvd: 108
Host info
Host 230.100.128.139.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 139.128.100.230.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
114.203.178.207 attack
Sep  7 17:52:30 localhost kernel: [1630967.555753] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=114.203.178.207 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=49 ID=13686 PROTO=TCP SPT=2917 DPT=23 WINDOW=63365 RES=0x00 SYN URGP=0 
Sep  7 17:52:30 localhost kernel: [1630967.555760] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=114.203.178.207 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=49 ID=13686 PROTO=TCP SPT=2917 DPT=23 SEQ=758669438 ACK=0 WINDOW=63365 RES=0x00 SYN URGP=0 
Sep  7 17:52:31 localhost kernel: [1630967.581193] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=114.203.178.207 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=49 ID=13686 PROTO=TCP SPT=2917 DPT=23 WINDOW=63365 RES=0x00 SYN URGP=0 
Sep  7 17:52:31 localhost kernel: [1630967.581200] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=114.203.178.207 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0
2019-09-08 07:10:24
129.204.77.45 attack
Sep  7 18:44:30 vps200512 sshd\[2649\]: Invalid user butter from 129.204.77.45
Sep  7 18:44:30 vps200512 sshd\[2649\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.77.45
Sep  7 18:44:32 vps200512 sshd\[2649\]: Failed password for invalid user butter from 129.204.77.45 port 54128 ssh2
Sep  7 18:49:22 vps200512 sshd\[2717\]: Invalid user teamspeak3 from 129.204.77.45
Sep  7 18:49:22 vps200512 sshd\[2717\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.77.45
2019-09-08 06:51:28
95.243.136.198 attackbots
Sep  8 00:11:50 mail sshd[11982]: Invalid user user from 95.243.136.198
Sep  8 00:11:50 mail sshd[11982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.243.136.198
Sep  8 00:11:50 mail sshd[11982]: Invalid user user from 95.243.136.198
Sep  8 00:11:52 mail sshd[11982]: Failed password for invalid user user from 95.243.136.198 port 50165 ssh2
Sep  8 00:26:15 mail sshd[13840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.243.136.198  user=root
Sep  8 00:26:18 mail sshd[13840]: Failed password for root from 95.243.136.198 port 52644 ssh2
...
2019-09-08 06:58:07
106.13.137.83 attackspam
Sep  8 01:41:31 tuotantolaitos sshd[17035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.137.83
Sep  8 01:41:33 tuotantolaitos sshd[17035]: Failed password for invalid user redbot from 106.13.137.83 port 44708 ssh2
...
2019-09-08 06:54:26
200.98.143.112 attackspam
Unauthorised access (Sep  8) SRC=200.98.143.112 LEN=40 TTL=242 ID=58200 TCP DPT=445 WINDOW=1024 SYN
2019-09-08 07:08:48
172.72.237.122 attack
Spam
2019-09-08 06:43:21
187.78.61.61 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-07 21:19:31,076 INFO [amun_request_handler] PortScan Detected on Port: 445 (187.78.61.61)
2019-09-08 07:02:21
168.195.168.138 attackbotsspam
Spam
2019-09-08 06:45:07
82.187.186.115 attackspam
Sep  7 11:47:47 lcdev sshd\[31998\]: Invalid user 12345 from 82.187.186.115
Sep  7 11:47:47 lcdev sshd\[31998\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host115-186-static.187-82-b.business.telecomitalia.it
Sep  7 11:47:49 lcdev sshd\[31998\]: Failed password for invalid user 12345 from 82.187.186.115 port 47266 ssh2
Sep  7 11:51:59 lcdev sshd\[32347\]: Invalid user uftp123 from 82.187.186.115
Sep  7 11:51:59 lcdev sshd\[32347\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host115-186-static.187-82-b.business.telecomitalia.it
2019-09-08 07:31:06
190.8.149.146 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-07 21:16:23,409 INFO [amun_request_handler] PortScan Detected on Port: 445 (190.8.149.146)
2019-09-08 07:16:34
142.11.218.41 attack
Spam
2019-09-08 06:46:28
54.37.154.254 attack
Sep  8 00:44:36 pkdns2 sshd\[64507\]: Invalid user christian from 54.37.154.254Sep  8 00:44:38 pkdns2 sshd\[64507\]: Failed password for invalid user christian from 54.37.154.254 port 49733 ssh2Sep  8 00:48:23 pkdns2 sshd\[64700\]: Invalid user mc from 54.37.154.254Sep  8 00:48:25 pkdns2 sshd\[64700\]: Failed password for invalid user mc from 54.37.154.254 port 43636 ssh2Sep  8 00:52:17 pkdns2 sshd\[64867\]: Invalid user ts3bot from 54.37.154.254Sep  8 00:52:19 pkdns2 sshd\[64867\]: Failed password for invalid user ts3bot from 54.37.154.254 port 37547 ssh2
...
2019-09-08 07:15:01
49.88.112.63 attackspam
SSH Brute-Force reported by Fail2Ban
2019-09-08 06:51:03
149.202.45.205 attack
Sep  7 16:48:16 aat-srv002 sshd[22030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.45.205
Sep  7 16:48:19 aat-srv002 sshd[22030]: Failed password for invalid user test from 149.202.45.205 port 55392 ssh2
Sep  7 16:52:19 aat-srv002 sshd[22126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.45.205
Sep  7 16:52:21 aat-srv002 sshd[22126]: Failed password for invalid user system from 149.202.45.205 port 42756 ssh2
...
2019-09-08 07:14:27
159.192.133.106 attack
Sep  7 19:13:19 ny01 sshd[12741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.192.133.106
Sep  7 19:13:20 ny01 sshd[12741]: Failed password for invalid user sinusbot123 from 159.192.133.106 port 57165 ssh2
Sep  7 19:18:52 ny01 sshd[13702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.192.133.106
2019-09-08 07:27:54

Recently Reported IPs

50.143.5.153 212.188.225.221 195.120.148.186 8.148.107.111
163.203.240.210 65.252.84.249 6.84.37.72 87.99.44.243
88.110.141.92 53.23.194.253 35.50.174.213 211.142.171.82
162.10.15.220 228.192.236.247 157.116.103.94 88.235.240.168
190.4.234.175 246.191.200.92 33.130.148.159 218.232.34.149