Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.135.21.174
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55522
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.135.21.174.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030700 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 07 22:48:26 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 174.21.135.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 174.21.135.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
187.85.210.63 attackspam
Unauthorized connection attempt from IP address 187.85.210.63 on Port 587(SMTP-MSA)
2019-08-28 08:13:38
194.182.65.169 attackspambots
Aug 28 01:45:54 MK-Soft-Root1 sshd\[27693\]: Invalid user worker123 from 194.182.65.169 port 34962
Aug 28 01:45:54 MK-Soft-Root1 sshd\[27693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.182.65.169
Aug 28 01:45:56 MK-Soft-Root1 sshd\[27693\]: Failed password for invalid user worker123 from 194.182.65.169 port 34962 ssh2
...
2019-08-28 08:27:11
185.171.89.152 attack
Unauthorized connection attempt from IP address 185.171.89.152 on Port 445(SMB)
2019-08-28 08:05:09
123.206.80.193 attackbotsspam
Automatic report - Banned IP Access
2019-08-28 07:52:00
191.249.123.30 attackbotsspam
Unauthorized connection attempt from IP address 191.249.123.30 on Port 445(SMB)
2019-08-28 08:01:06
138.68.140.76 attackspam
Aug 27 23:42:34 MK-Soft-VM3 sshd\[31642\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.140.76  user=root
Aug 27 23:42:36 MK-Soft-VM3 sshd\[31642\]: Failed password for root from 138.68.140.76 port 58848 ssh2
Aug 27 23:46:25 MK-Soft-VM3 sshd\[31820\]: Invalid user zimbra from 138.68.140.76 port 47844
Aug 27 23:46:25 MK-Soft-VM3 sshd\[31820\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.140.76
...
2019-08-28 07:57:58
12.218.23.62 attackspam
Unauthorized connection attempt from IP address 12.218.23.62 on Port 445(SMB)
2019-08-28 07:51:13
107.170.195.219 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-28 07:47:31
14.98.32.214 attack
Aug 27 19:52:26 xtremcommunity sshd\[19406\]: Invalid user p@55wOrd from 14.98.32.214 port 43045
Aug 27 19:52:26 xtremcommunity sshd\[19406\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.98.32.214
Aug 27 19:52:28 xtremcommunity sshd\[19406\]: Failed password for invalid user p@55wOrd from 14.98.32.214 port 43045 ssh2
Aug 27 19:58:01 xtremcommunity sshd\[19590\]: Invalid user asdfg1234 from 14.98.32.214 port 35308
Aug 27 19:58:01 xtremcommunity sshd\[19590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.98.32.214
...
2019-08-28 08:16:14
134.209.21.83 attackspambots
Aug 27 13:40:43 web1 sshd\[15820\]: Invalid user yayan from 134.209.21.83
Aug 27 13:40:43 web1 sshd\[15820\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.21.83
Aug 27 13:40:46 web1 sshd\[15820\]: Failed password for invalid user yayan from 134.209.21.83 port 38928 ssh2
Aug 27 13:44:49 web1 sshd\[16209\]: Invalid user marcos from 134.209.21.83
Aug 27 13:44:49 web1 sshd\[16209\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.21.83
2019-08-28 08:18:46
223.144.134.191 attackspambots
" "
2019-08-28 07:57:30
66.188.143.209 attackspambots
SSH/22 MH Probe, BF, Hack -
2019-08-28 08:05:40
187.109.49.183 attack
Unauthorized connection attempt from IP address 187.109.49.183 on Port 587(SMTP-MSA)
2019-08-28 08:24:08
213.32.71.196 attack
SSH-BruteForce
2019-08-28 08:25:58
51.38.37.128 attack
Aug 27 23:59:11 plex sshd[2367]: Invalid user hb from 51.38.37.128 port 43950
2019-08-28 08:07:03

Recently Reported IPs

206.73.36.110 222.180.189.90 227.214.52.7 131.38.0.42
5.82.19.87 180.223.223.233 222.167.106.139 180.152.184.7
176.132.24.100 137.69.233.199 217.54.155.23 127.18.31.244
93.108.248.177 24.33.9.5 209.133.203.184 28.246.30.228
1.154.99.32 161.172.227.20 85.174.124.144 28.251.110.102