Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Pasig City

Region: National Capital Region

Country: Philippines

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       139.135.128.0 - 139.135.255.255
CIDR:           139.135.128.0/17
NetName:        APNIC
NetHandle:      NET-139-135-128-0-1
Parent:         NET139 (NET-139-0-0-0-0)
NetType:        Early Registrations, Transferred to APNIC
OriginAS:       
Organization:   Asia Pacific Network Information Centre (APNIC)
RegDate:        2021-01-19
Updated:        2021-01-19
Ref:            https://rdap.arin.net/registry/ip/139.135.128.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois://whois.apnic.net


OrgName:        Asia Pacific Network Information Centre
OrgId:          APNIC
Address:        PO Box 3646
City:           South Brisbane
StateProv:      QLD
PostalCode:     4101
Country:        AU
RegDate:        
Updated:        2012-01-24
Ref:            https://rdap.arin.net/registry/entity/APNIC

ReferralServer:  whois://whois.apnic.net
ResourceLink:  http://wq.apnic.net/whois-search/static/search.html

OrgTechHandle: AWC12-ARIN
OrgTechName:   APNIC Whois Contact
OrgTechPhone:  +61 7 3858 3188 
OrgTechEmail:  search-apnic-not-arin@apnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN

OrgAbuseHandle: AWC12-ARIN
OrgAbuseName:   APNIC Whois Contact
OrgAbusePhone:  +61 7 3858 3188 
OrgAbuseEmail:  search-apnic-not-arin@apnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.apnic.net.

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '139.135.148.0 - 139.135.151.255'

% Abuse contact for '139.135.148.0 - 139.135.151.255' is 'abuse@convergeict.com'

inetnum:        139.135.148.0 - 139.135.151.255
netname:        Converge_ICT_Network
descr:          Converge ICT SME Customer
country:        PH
geoloc:         14.5995 120.9842
admin-c:        CISI3-AP
tech-c:         CISI3-AP
abuse-c:        AC1640-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-CONVERGE-PH
mnt-irt:        IRT-CONVERGE-PH
last-modified:  2022-10-11T05:44:11Z
source:         APNIC

irt:            IRT-CONVERGE-PH
address:        Reliance Center Annex 1,
e-mail:         abuse@convergeict.com
abuse-mailbox:  abuse@convergeict.com
admin-c:        CISI3-AP
tech-c:         CISI3-AP
auth:           # Filtered
remarks:        abuse@convergeict.com is invalid
mnt-by:         MAINT-CONVERGE-PH
last-modified:  2025-11-18T00:30:25Z
source:         APNIC

role:           ABUSE CONVERGEPH
country:        ZZ
address:        Reliance Center Annex 1,
phone:          +000000000
e-mail:         abuse@convergeict.com
admin-c:        CISI3-AP
tech-c:         CISI3-AP
nic-hdl:        AC1640-AP
remarks:        Generated from irt object IRT-CONVERGE-PH
remarks:        abuse@convergeict.com is invalid
abuse-mailbox:  abuse@convergeict.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-04T20:52:57Z
source:         APNIC

role:           CONVERGE ICT SOLUTIONS INC administrator
address:        Reliance Center Annex 1, #99 E. Rodriguez Jr. Ave. Pasig City, Pasig City
country:        PH
phone:          +63-2-667-0880
fax-no:         +63-2-667-0880
e-mail:         abuse@convergeict.com
admin-c:        CISI3-AP
tech-c:         CISI3-AP
nic-hdl:        CISI3-AP
mnt-by:         MAINT-CONVERGE-PH
last-modified:  2015-11-03T23:33:23Z
source:         APNIC

% Information related to '139.135.148.0/22AS17639'

route:          139.135.148.0/22
origin:         AS17639
descr:          CONVERGE INFORMATION AND COMMUNICATIONS TECHNOLOGY SOLUTIONS, INC
                Reliance Center Annex 1
                #99 E. Rodriguez Jr. Ave. Pasig City
mnt-by:         MAINT-CONVERGE-PH
last-modified:  2022-12-19T06:02:27Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.135.151.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15192
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.135.151.139.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031900 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 19 22:47:13 CST 2026
;; MSG SIZE  rcvd: 108
Host info
b'139.151.135.139.in-addr.arpa domain name pointer 139.135.151.139.convergeict.com.
'
Nslookup info:
b'139.151.135.139.in-addr.arpa	name = 139.135.151.139.convergeict.com.

Authoritative answers can be found from:

'
Related IP info:
Related comments:
IP Type Details Datetime
111.200.242.26 attackspam
Dec 12 00:42:42 OPSO sshd\[460\]: Invalid user sting from 111.200.242.26 port 13048
Dec 12 00:42:42 OPSO sshd\[460\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.200.242.26
Dec 12 00:42:44 OPSO sshd\[460\]: Failed password for invalid user sting from 111.200.242.26 port 13048 ssh2
Dec 12 00:48:33 OPSO sshd\[2113\]: Invalid user wan from 111.200.242.26 port 33982
Dec 12 00:48:33 OPSO sshd\[2113\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.200.242.26
2019-12-12 07:55:18
173.239.37.139 attackspambots
Triggered by Fail2Ban at Vostok web server
2019-12-12 08:12:14
191.88.108.66 attackspambots
Telnet/23 MH Probe, BF, Hack -
2019-12-12 08:11:21
101.108.215.138 attack
Dec 12 02:48:10 debian-2gb-vpn-nbg1-1 kernel: [486472.182412] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=101.108.215.138 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=50 ID=55852 PROTO=TCP SPT=22557 DPT=60001 WINDOW=19945 RES=0x00 SYN URGP=0
2019-12-12 08:18:57
77.247.108.119 attackbots
Dec 12 00:48:25 debian-2gb-nbg1-2 kernel: \[24389646.930306\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=77.247.108.119 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=28406 PROTO=TCP SPT=47476 DPT=5038 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-12 08:01:26
1.202.114.70 attackspam
The IP has triggered Cloudflare WAF. CF-Ray: 5430b6e4ef8ad362 | WAF_Rule_ID: 53b8357af6d244d3a132bcf913c3a388 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: blog.skk.moe | User-Agent: Mozilla/4.074482891 Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 07:49:03
2400:dd0d:2000:0:56c8:e3ee:668f:3df attackbots
The IP has triggered Cloudflare WAF. CF-Ray: 5431acba9890bb4c | WAF_Rule_ID: 1112825 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: img.skk.moe | User-Agent: Mozilla/5.0 (Linux; Android 6.0; Nexus 5 Build/MRA58N) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Mobile Safari/537.36 | CF_DC: SEA. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 07:46:51
14.116.222.170 attackspam
2019-12-12T00:40:30.557770vps751288.ovh.net sshd\[30921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.116.222.170  user=root
2019-12-12T00:40:32.276170vps751288.ovh.net sshd\[30921\]: Failed password for root from 14.116.222.170 port 49846 ssh2
2019-12-12T00:48:04.378592vps751288.ovh.net sshd\[30999\]: Invalid user mcelligott from 14.116.222.170 port 53610
2019-12-12T00:48:04.387035vps751288.ovh.net sshd\[30999\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.116.222.170
2019-12-12T00:48:06.431458vps751288.ovh.net sshd\[30999\]: Failed password for invalid user mcelligott from 14.116.222.170 port 53610 ssh2
2019-12-12 08:22:49
91.121.116.65 attack
Dec 11 18:48:16 TORMINT sshd\[22327\]: Invalid user avant from 91.121.116.65
Dec 11 18:48:16 TORMINT sshd\[22327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.116.65
Dec 11 18:48:18 TORMINT sshd\[22327\]: Failed password for invalid user avant from 91.121.116.65 port 60198 ssh2
...
2019-12-12 08:11:32
200.16.132.202 attackspambots
Dec 11 18:41:13 ny01 sshd[14291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.16.132.202
Dec 11 18:41:14 ny01 sshd[14291]: Failed password for invalid user admin from 200.16.132.202 port 33647 ssh2
Dec 11 18:48:28 ny01 sshd[15061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.16.132.202
2019-12-12 07:59:45
180.191.107.33 attackspam
TCP Port Scanning
2019-12-12 07:57:36
109.196.217.23 attackspambots
Unauthorized connection attempt detected from IP address 109.196.217.23 to port 445
2019-12-12 08:10:27
182.61.22.205 attackbotsspam
Dec 12 01:01:12 markkoudstaal sshd[21472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.22.205
Dec 12 01:01:14 markkoudstaal sshd[21472]: Failed password for invalid user yosua from 182.61.22.205 port 55842 ssh2
Dec 12 01:08:07 markkoudstaal sshd[22222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.22.205
2019-12-12 08:21:33
192.144.225.150 attackbots
Dec 11 13:42:24 hpm sshd\[16791\]: Invalid user beemer from 192.144.225.150
Dec 11 13:42:24 hpm sshd\[16791\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.225.150
Dec 11 13:42:26 hpm sshd\[16791\]: Failed password for invalid user beemer from 192.144.225.150 port 53208 ssh2
Dec 11 13:48:30 hpm sshd\[17399\]: Invalid user bbbbbb from 192.144.225.150
Dec 11 13:48:30 hpm sshd\[17399\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.225.150
2019-12-12 07:57:04
201.1.9.74 attackspam
Telnet/23 MH Probe, BF, Hack -
2019-12-12 08:06:35

Recently Reported IPs

2606:4700:10::6816:3549 38.244.66.10 249.89.87.118 40.124.174.245
2606:4700:10::6814:7241 122.193.247.58 2606:4700:10::ac43:2915 2606:4700:10::6814:6346
2606:4700:10::6814:7384 2606:4700:10::6814:4648 2606:4700:10::6816:3308 2606:4700:10::6814:5745
2606:4700:10::6814:8663 2606:4700:10::ac43:2468 2606:4700:10::6814:5148 2606:4700:10::6814:9121
2606:4700:10::6814:8590 2606:4700:10::6816:2719 2606:4700:10::6816:3944 2606:4700:10::6816:2813