Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Australia

Internet Service Provider: Telstra Internet

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attack
Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 04:50:13.
2019-09-27 16:40:38
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.130.188.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39587
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.130.188.107.		IN	A

;; AUTHORITY SECTION:
.			430	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019092700 1800 900 604800 86400

;; Query time: 505 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 27 16:40:34 CST 2019
;; MSG SIZE  rcvd: 119
Host info
107.188.130.139.in-addr.arpa domain name pointer gol1353851.lnk.telstra.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
107.188.130.139.in-addr.arpa	name = gol1353851.lnk.telstra.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
112.35.46.21 attackspambots
Aug 28 07:14:32 hiderm sshd\[4474\]: Invalid user emelia from 112.35.46.21
Aug 28 07:14:32 hiderm sshd\[4474\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.35.46.21
Aug 28 07:14:34 hiderm sshd\[4474\]: Failed password for invalid user emelia from 112.35.46.21 port 36650 ssh2
Aug 28 07:18:22 hiderm sshd\[4776\]: Invalid user mc from 112.35.46.21
Aug 28 07:18:22 hiderm sshd\[4776\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.35.46.21
2019-08-29 07:17:27
104.27.171.94 attackbotsspam
Unsolicited bulk porn - varying Chinanet ISPs, common www.google.com/#btnl "search" spam link; repetitive redirects; spam volume up to 3/day

Unsolicited bulk spam - GiseleTondremail.com, China Unicom Beijing Province Network  - 61.149.142.34

Spam link www.google.com = 172.217.7.196, Google - SEARCH REDIRECT TO REPEAT IP:
-	xeolamberg.xyz = 92.63.192.124, NVFOPServer-net
-	havefunwithprettybabies.com = 104.27.170.94, 104.27.171.94, Cloudflare
-	t-r-f-k.com = 88.99.33.187, 95.216.190.44, Hetzner Online GmbH
-	code.jquery.com = 205.185.208.52, Highwinds Network

Sender domain GiseleTondremail.com = no DNS found
2019-08-29 06:59:09
167.71.219.49 attack
2019-08-28T23:02:36.905430abusebot-8.cloudsearch.cf sshd\[8929\]: Invalid user postgres from 167.71.219.49 port 53498
2019-08-29 07:14:15
42.104.97.227 attackbots
Aug 29 00:48:30 dev0-dcde-rnet sshd[15303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.104.97.227
Aug 29 00:48:33 dev0-dcde-rnet sshd[15303]: Failed password for invalid user darren from 42.104.97.227 port 48409 ssh2
Aug 29 00:52:43 dev0-dcde-rnet sshd[15335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.104.97.227
2019-08-29 06:57:21
193.32.160.142 attackbots
Aug 28 23:26:30 relay postfix/smtpd\[15937\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.142\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[193.32.160.139\]\>
Aug 28 23:26:30 relay postfix/smtpd\[15937\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.142\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[193.32.160.139\]\>
Aug 28 23:26:30 relay postfix/smtpd\[15937\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.142\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[193.32.160.139\]\>
Aug 28 23:26:30 relay postfix/smtpd\[15937\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.142\]: 554 5.7.1 \: Relay access denied\; from=\
2019-08-29 07:15:35
116.106.148.175 attackspam
9000/tcp 23/tcp
[2019-08-26/27]2pkt
2019-08-29 06:56:50
138.68.4.8 attackbotsspam
Aug 28 21:43:03 lcl-usvr-01 sshd[10966]: Invalid user serge from 138.68.4.8
Aug 28 21:43:03 lcl-usvr-01 sshd[10966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.4.8 
Aug 28 21:43:03 lcl-usvr-01 sshd[10966]: Invalid user serge from 138.68.4.8
Aug 28 21:43:04 lcl-usvr-01 sshd[10966]: Failed password for invalid user serge from 138.68.4.8 port 52074 ssh2
Aug 28 21:52:59 lcl-usvr-01 sshd[13572]: Invalid user argo from 138.68.4.8
2019-08-29 06:35:11
182.61.167.130 attack
Automatic report - Banned IP Access
2019-08-29 07:02:45
124.239.196.154 attack
Aug 28 09:23:28 hpm sshd\[3866\]: Invalid user tc from 124.239.196.154
Aug 28 09:23:28 hpm sshd\[3866\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.239.196.154
Aug 28 09:23:29 hpm sshd\[3866\]: Failed password for invalid user tc from 124.239.196.154 port 35408 ssh2
Aug 28 09:27:29 hpm sshd\[4198\]: Invalid user lorene from 124.239.196.154
Aug 28 09:27:29 hpm sshd\[4198\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.239.196.154
2019-08-29 06:58:42
125.44.191.99 attackspam
ssh failed login
2019-08-29 06:53:59
178.62.33.38 attackbots
Aug 29 00:32:34 icinga sshd[23180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.33.38
Aug 29 00:32:36 icinga sshd[23180]: Failed password for invalid user donald from 178.62.33.38 port 50364 ssh2
...
2019-08-29 06:42:57
167.99.131.243 attackspambots
Aug 28 20:58:30 mail sshd[2672]: Invalid user willie from 167.99.131.243
Aug 28 20:58:30 mail sshd[2672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.131.243
Aug 28 20:58:30 mail sshd[2672]: Invalid user willie from 167.99.131.243
Aug 28 20:58:32 mail sshd[2672]: Failed password for invalid user willie from 167.99.131.243 port 50284 ssh2
Aug 28 21:06:39 mail sshd[15312]: Invalid user admin from 167.99.131.243
...
2019-08-29 06:42:31
159.65.111.89 attack
Invalid user wss from 159.65.111.89 port 39962
2019-08-29 06:33:51
198.252.206.25 attack
I found this IP address on my cmd netstats. I have not used stackexchange website
2019-08-29 06:40:32
157.230.16.197 attack
Aug 28 22:56:00 vpn01 sshd\[4687\]: Invalid user sya from 157.230.16.197
Aug 28 22:56:00 vpn01 sshd\[4687\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.16.197
Aug 28 22:56:03 vpn01 sshd\[4687\]: Failed password for invalid user sya from 157.230.16.197 port 45895 ssh2
2019-08-29 06:45:10

Recently Reported IPs

162.153.141.85 200.48.75.24 225.30.165.235 27.22.86.72
248.196.176.228 69.1.70.11 29.140.119.89 189.249.129.177
58.234.95.98 192.141.169.15 5.141.82.77 202.142.144.190
141.172.93.63 110.89.59.87 83.238.86.158 114.34.194.171
146.185.205.91 122.139.53.236 109.94.175.67 125.227.254.156