Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Elkhorn

Region: Nebraska

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.131.48.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58806
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.131.48.164.			IN	A

;; AUTHORITY SECTION:
.			314	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020300 1800 900 604800 86400

;; Query time: 51 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 20:21:43 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 164.48.131.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 164.48.131.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
182.72.104.106 attack
Jul 18 10:55:11 localhost sshd\[5795\]: Invalid user nextcloud from 182.72.104.106 port 50380
Jul 18 10:55:11 localhost sshd\[5795\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.72.104.106
Jul 18 10:55:13 localhost sshd\[5795\]: Failed password for invalid user nextcloud from 182.72.104.106 port 50380 ssh2
...
2019-07-18 22:32:54
200.87.95.35 attackbots
Jul 18 14:52:09 [host] sshd[5750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.87.95.35  user=root
Jul 18 14:52:12 [host] sshd[5750]: Failed password for root from 200.87.95.35 port 17353 ssh2
Jul 18 14:58:17 [host] sshd[5923]: Invalid user cron from 200.87.95.35
2019-07-18 21:42:32
218.92.0.192 attackspam
vps1:pam-generic
2019-07-18 22:16:06
158.69.22.218 attackspam
Jul 18 09:40:21 vps200512 sshd\[3846\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.22.218  user=bin
Jul 18 09:40:23 vps200512 sshd\[3846\]: Failed password for bin from 158.69.22.218 port 43128 ssh2
Jul 18 09:45:14 vps200512 sshd\[3941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.22.218  user=root
Jul 18 09:45:15 vps200512 sshd\[3941\]: Failed password for root from 158.69.22.218 port 41646 ssh2
Jul 18 09:50:12 vps200512 sshd\[4036\]: Invalid user alex from 158.69.22.218
2019-07-18 21:55:37
54.36.150.10 attackspambots
Automatic report - Banned IP Access
2019-07-18 22:12:33
177.72.4.90 attackspam
2019-07-18 05:55:15 H=(static-90.4.72.177-ttvi.com.br) [177.72.4.90]:38562 I=[192.147.25.65]:25 sender verify fail for : Unrouteable address
2019-07-18 05:55:15 H=(static-90.4.72.177-ttvi.com.br) [177.72.4.90]:38562 I=[192.147.25.65]:25 F= rejected RCPT : Sender verify failed
2019-07-18 05:55:16 H=(static-90.4.72.177-ttvi.com.br) [177.72.4.90]:38562 I=[192.147.25.65]:25 F= rejected RCPT : Sender verify failed
...
2019-07-18 22:28:19
206.189.198.64 attackspambots
Jul 18 09:21:10 vps200512 sshd\[3359\]: Invalid user candice from 206.189.198.64
Jul 18 09:21:10 vps200512 sshd\[3359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.198.64
Jul 18 09:21:12 vps200512 sshd\[3359\]: Failed password for invalid user candice from 206.189.198.64 port 38906 ssh2
Jul 18 09:27:37 vps200512 sshd\[3498\]: Invalid user support from 206.189.198.64
Jul 18 09:27:37 vps200512 sshd\[3498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.198.64
2019-07-18 21:39:34
92.9.12.123 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-18 22:11:58
45.13.39.167 attackspambots
Jul 18 14:29:35 mail postfix/smtpd\[11332\]: warning: unknown\[45.13.39.167\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul 18 14:30:11 mail postfix/smtpd\[11332\]: warning: unknown\[45.13.39.167\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul 18 14:30:48 mail postfix/smtpd\[11332\]: warning: unknown\[45.13.39.167\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul 18 15:01:11 mail postfix/smtpd\[10937\]: warning: unknown\[45.13.39.167\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-07-18 22:14:59
94.177.229.191 attackbots
Jul 18 13:58:59 mail sshd\[31218\]: Failed password for invalid user gregory from 94.177.229.191 port 52504 ssh2
Jul 18 14:16:30 mail sshd\[31426\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.229.191  user=root
...
2019-07-18 21:28:42
116.206.19.139 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-18 09:34:46,532 INFO [amun_request_handler] PortScan Detected on Port: 445 (116.206.19.139)
2019-07-18 21:44:29
171.228.174.235 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-18 08:21:09,390 INFO [amun_request_handler] PortScan Detected on Port: 445 (171.228.174.235)
2019-07-18 22:10:28
92.81.141.33 attackspambots
Automatic report - Port Scan Attack
2019-07-18 22:15:35
107.148.101.94 attack
19/7/18@06:55:16: FAIL: Alarm-Intrusion address from=107.148.101.94
...
2019-07-18 22:29:01
1.32.40.165 attackbotsspam
Automatic report - Port Scan Attack
2019-07-18 21:45:36

Recently Reported IPs

176.119.140.226 14.182.195.230 160.153.245.123 91.126.189.146
14.160.29.66 200.192.82.116 164.77.155.202 162.243.129.92
124.235.227.19 113.20.100.174 141.0.179.251 105.158.30.161
94.226.98.236 42.119.240.108 71.134.86.70 58.231.20.65
152.239.251.187 15.206.70.23 125.220.208.92 111.201.202.175