Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.134.121.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3648
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.134.121.164.		IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 14:45:36 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 164.121.134.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 164.121.134.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.26.43.202 attack
Feb  4 15:15:26 dedicated sshd[7307]: Invalid user zabbix from 103.26.43.202 port 57934
2020-02-04 22:18:21
14.188.220.207 attack
2019-03-11 12:55:00 1h3JWF-0007f4-CN SMTP connection from \(static.vnpt.vn\) \[14.188.220.207\]:28512 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-11 12:55:16 1h3JWV-0007hE-U3 SMTP connection from \(static.vnpt.vn\) \[14.188.220.207\]:28669 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-11 12:55:26 1h3JWf-0007hd-8p SMTP connection from \(static.vnpt.vn\) \[14.188.220.207\]:28764 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-02-04 22:11:44
14.226.54.2 attackspam
2019-03-11 09:44:55 H=\(static.vnpt.vn\) \[14.226.54.2\]:20207 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-11 09:45:09 H=\(static.vnpt.vn\) \[14.226.54.2\]:20333 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-11 09:45:14 H=\(static.vnpt.vn\) \[14.226.54.2\]:20390 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
...
2020-02-04 22:00:19
185.184.24.33 attackbots
Feb  4 03:49:03 web1 sshd\[29164\]: Invalid user marty from 185.184.24.33
Feb  4 03:49:03 web1 sshd\[29164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.184.24.33
Feb  4 03:49:04 web1 sshd\[29164\]: Failed password for invalid user marty from 185.184.24.33 port 48062 ssh2
Feb  4 03:53:06 web1 sshd\[29520\]: Invalid user aquarius from 185.184.24.33
Feb  4 03:53:06 web1 sshd\[29520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.184.24.33
2020-02-04 22:03:07
14.182.68.198 attackbots
2019-03-08 11:54:03 1h2D8d-00072s-6K SMTP connection from \(static.vnpt.vn\) \[14.182.68.198\]:49945 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-08 11:54:31 1h2D94-00073V-No SMTP connection from \(static.vnpt.vn\) \[14.182.68.198\]:10135 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-08 11:54:45 1h2D9I-00073p-Fl SMTP connection from \(static.vnpt.vn\) \[14.182.68.198\]:10238 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-02-04 22:33:34
156.251.174.241 attackspambots
SSH brutforce
2020-02-04 22:16:36
14.177.107.31 attackbotsspam
2019-03-01 00:38:42 H=\(static.vnpt.vn\) \[14.177.107.31\]:39377 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-01 00:38:58 H=\(static.vnpt.vn\) \[14.177.107.31\]:39494 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-01 00:39:08 H=\(static.vnpt.vn\) \[14.177.107.31\]:39588 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
...
2020-02-04 22:39:21
93.117.80.5 attackspam
Feb  4 14:53:14 grey postfix/smtpd\[8449\]: NOQUEUE: reject: RCPT from unknown\[93.117.80.5\]: 554 5.7.1 Service unavailable\; Client host \[93.117.80.5\] blocked using cbl.abuseat.org\; Blocked - see http://www.abuseat.org/lookup.cgi\?ip=93.117.80.5\; from=\ to=\ proto=ESMTP helo=\<\[93.117.80.5\]\>
...
2020-02-04 21:58:20
52.39.73.151 attack
RDP Bruteforce
2020-02-04 22:03:23
198.108.66.96 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-04 22:26:53
14.185.62.59 attackspambots
2019-07-08 04:54:51 1hkJnm-0001gK-Cl SMTP connection from \(static.vnpt.vn\) \[14.185.62.59\]:25558 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-08 04:55:08 1hkJo3-0001hp-HG SMTP connection from \(static.vnpt.vn\) \[14.185.62.59\]:25709 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-08 04:55:18 1hkJoD-0001hy-8d SMTP connection from \(static.vnpt.vn\) \[14.185.62.59\]:25799 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-02-04 22:28:01
71.6.146.185 attackspam
Honeypot hit.
2020-02-04 22:40:49
14.187.119.146 attackbotsspam
2019-06-21 16:37:54 1heKfo-00082S-9v SMTP connection from \(static.vnpt.vn\) \[14.187.119.146\]:12095 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-06-21 16:37:58 1heKft-00082V-QN SMTP connection from \(static.vnpt.vn\) \[14.187.119.146\]:26808 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-06-21 16:38:01 1heKfv-00082W-W5 SMTP connection from \(static.vnpt.vn\) \[14.187.119.146\]:12151 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-02-04 22:19:11
14.189.245.3 attackbotsspam
2019-06-21 10:41:38 1heF72-00072X-Ao SMTP connection from \(static.vnpt.vn\) \[14.189.245.3\]:33367 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-06-21 10:41:59 1heF7M-00072r-BI SMTP connection from \(static.vnpt.vn\) \[14.189.245.3\]:33480 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-06-21 10:42:10 1heF7Y-000737-GD SMTP connection from \(static.vnpt.vn\) \[14.189.245.3\]:33546 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-02-04 22:10:17
212.117.65.11 attackbots
Feb  4 16:02:47 www2 sshd\[54346\]: Invalid user nagios from 212.117.65.11Feb  4 16:02:50 www2 sshd\[54346\]: Failed password for invalid user nagios from 212.117.65.11 port 48894 ssh2Feb  4 16:04:18 www2 sshd\[54479\]: Failed password for www-data from 212.117.65.11 port 34790 ssh2
...
2020-02-04 22:07:06

Recently Reported IPs

15.206.150.96 15.206.171.49 15.206.179.37 15.206.176.204
15.206.189.233 15.206.181.216 15.206.192.253 15.206.18.80
15.206.180.27 15.206.192.56 15.206.195.137 15.206.196.11
15.206.194.183 15.206.199.74 15.206.204.12 15.206.211.225
15.206.200.173 15.206.224.99 15.206.226.245 15.206.228.25