Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Omaha

Region: Nebraska

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.131.145.204
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30184
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.131.145.204.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024122201 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 23 10:10:14 CST 2024
;; MSG SIZE  rcvd: 108
Host info
Host 204.145.131.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 204.145.131.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.73.235.149 attack
Dec 16 01:40:31 php1 sshd\[18497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.73.235.149  user=root
Dec 16 01:40:33 php1 sshd\[18497\]: Failed password for root from 49.73.235.149 port 54509 ssh2
Dec 16 01:49:18 php1 sshd\[19513\]: Invalid user guest from 49.73.235.149
Dec 16 01:49:18 php1 sshd\[19513\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.73.235.149
Dec 16 01:49:20 php1 sshd\[19513\]: Failed password for invalid user guest from 49.73.235.149 port 53534 ssh2
2019-12-16 21:26:11
218.85.22.206 attackbots
Scanning
2019-12-16 21:30:29
222.186.190.17 attackbotsspam
Dec 16 11:56:07 sip sshd[15629]: Failed password for root from 222.186.190.17 port 17555 ssh2
Dec 16 11:56:44 sip sshd[15818]: Failed password for root from 222.186.190.17 port 64095 ssh2
2019-12-16 21:54:52
51.254.32.102 attack
Dec 16 16:08:37 server sshd\[13555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.ip-51-254-32.eu  user=mysql
Dec 16 16:08:38 server sshd\[13555\]: Failed password for mysql from 51.254.32.102 port 36302 ssh2
Dec 16 16:20:24 server sshd\[17251\]: Invalid user md from 51.254.32.102
Dec 16 16:20:24 server sshd\[17251\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.ip-51-254-32.eu 
Dec 16 16:20:27 server sshd\[17251\]: Failed password for invalid user md from 51.254.32.102 port 59148 ssh2
...
2019-12-16 21:49:47
163.44.158.95 attackspam
Triggered by Fail2Ban at Ares web server
2019-12-16 21:28:20
119.252.143.102 attackspam
Dec 16 15:19:28 vtv3 sshd[15051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.252.143.102 
Dec 16 15:19:30 vtv3 sshd[15051]: Failed password for invalid user nt from 119.252.143.102 port 53442 ssh2
Dec 16 15:25:47 vtv3 sshd[18404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.252.143.102 
Dec 16 15:38:12 vtv3 sshd[24063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.252.143.102 
Dec 16 15:38:14 vtv3 sshd[24063]: Failed password for invalid user guest from 119.252.143.102 port 43326 ssh2
Dec 16 15:44:38 vtv3 sshd[27139]: Failed password for root from 119.252.143.102 port 39958 ssh2
Dec 16 15:57:00 vtv3 sshd[1001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.252.143.102 
Dec 16 15:57:02 vtv3 sshd[1001]: Failed password for invalid user host from 119.252.143.102 port 33220 ssh2
Dec 16 16:03:28 vtv3 sshd[3898]: pam_unix(sshd:a
2019-12-16 21:22:48
188.166.108.161 attack
Invalid user http from 188.166.108.161 port 53346
2019-12-16 21:45:05
114.219.56.124 attack
Dec 16 14:20:27 vps691689 sshd[26975]: Failed password for root from 114.219.56.124 port 47910 ssh2
Dec 16 14:28:31 vps691689 sshd[27232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.219.56.124
...
2019-12-16 21:28:36
45.141.85.101 attack
proto=tcp  .  spt=28865  .  dpt=3389  .  src=45.141.85.101  .  dst=xx.xx.4.1  .     (Found on   CINS badguys  Dec 16)     (466)
2019-12-16 21:47:09
85.172.107.10 attackspam
IP blocked
2019-12-16 21:53:50
202.141.231.194 attackbotsspam
firewall-block, port(s): 1433/tcp
2019-12-16 21:36:53
188.213.165.189 attackspambots
Dec 16 14:01:53 MK-Soft-VM6 sshd[24554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.213.165.189 
Dec 16 14:01:55 MK-Soft-VM6 sshd[24554]: Failed password for invalid user prasad from 188.213.165.189 port 39418 ssh2
...
2019-12-16 21:23:31
192.99.57.32 attack
Invalid user test from 192.99.57.32 port 48730
2019-12-16 21:51:01
23.99.176.168 attackspambots
Invalid user ticheng from 23.99.176.168 port 3968
2019-12-16 21:27:34
40.92.64.22 attack
Dec 16 09:23:24 debian-2gb-vpn-nbg1-1 kernel: [855774.620106] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.64.22 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=238 ID=53566 DF PROTO=TCP SPT=7079 DPT=25 WINDOW=0 RES=0x00 ACK RST URGP=0
2019-12-16 21:39:39

Recently Reported IPs

162.38.149.136 128.254.2.190 162.226.44.159 124.16.209.211
29.22.130.143 61.162.99.194 165.135.206.250 98.1.179.69
19.21.168.243 225.245.65.64 195.166.250.231 180.223.72.100
116.92.58.45 172.29.97.160 33.217.163.173 124.46.56.20
30.94.155.120 32.91.125.35 234.164.203.205 232.255.8.137