Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.139.140.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13048
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.139.140.40.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 01:00:24 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 40.140.139.139.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 139.139.140.40.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
125.46.11.67 attack
 TCP (SYN) 125.46.11.67:50741 -> port 6378, len 44
2020-09-21 23:17:46
187.188.240.7 attackbots
Sep 21 11:47:44 ns382633 sshd\[27402\]: Invalid user ftp01 from 187.188.240.7 port 38308
Sep 21 11:47:44 ns382633 sshd\[27402\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.188.240.7
Sep 21 11:47:46 ns382633 sshd\[27402\]: Failed password for invalid user ftp01 from 187.188.240.7 port 38308 ssh2
Sep 21 11:50:43 ns382633 sshd\[28150\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.188.240.7  user=root
Sep 21 11:50:45 ns382633 sshd\[28150\]: Failed password for root from 187.188.240.7 port 33568 ssh2
2020-09-21 22:48:45
197.90.184.250 attack
Telnet Honeypot -> Telnet Bruteforce / Login
2020-09-21 22:57:31
119.237.158.92 attackbots
Sep 19 20:01:26 roki-contabo sshd\[28881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.237.158.92  user=root
Sep 19 20:01:28 roki-contabo sshd\[28881\]: Failed password for root from 119.237.158.92 port 41822 ssh2
Sep 20 19:01:36 roki-contabo sshd\[26225\]: Invalid user pi from 119.237.158.92
Sep 20 19:01:36 roki-contabo sshd\[26225\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.237.158.92
Sep 20 19:01:38 roki-contabo sshd\[26225\]: Failed password for invalid user pi from 119.237.158.92 port 34848 ssh2
...
2020-09-21 22:58:01
213.150.184.62 attackspam
Total attacks: 2
2020-09-21 23:11:15
123.18.182.20 attackbots
Unauthorized connection attempt from IP address 123.18.182.20 on Port 445(SMB)
2020-09-21 22:51:24
213.55.92.56 attack
Unauthorized connection attempt from IP address 213.55.92.56 on Port 445(SMB)
2020-09-21 23:00:37
176.15.129.156 attackbotsspam
Unauthorized connection attempt from IP address 176.15.129.156 on Port 445(SMB)
2020-09-21 23:07:42
23.101.196.5 attackspambots
2020-09-21T13:50:06.560220abusebot-2.cloudsearch.cf sshd[7238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.101.196.5  user=root
2020-09-21T13:50:08.511782abusebot-2.cloudsearch.cf sshd[7238]: Failed password for root from 23.101.196.5 port 40766 ssh2
2020-09-21T13:50:18.304417abusebot-2.cloudsearch.cf sshd[7240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.101.196.5  user=root
2020-09-21T13:50:20.236109abusebot-2.cloudsearch.cf sshd[7240]: Failed password for root from 23.101.196.5 port 57130 ssh2
2020-09-21T13:50:29.214023abusebot-2.cloudsearch.cf sshd[7242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.101.196.5  user=root
2020-09-21T13:50:31.657244abusebot-2.cloudsearch.cf sshd[7242]: Failed password for root from 23.101.196.5 port 45342 ssh2
2020-09-21T13:50:40.131604abusebot-2.cloudsearch.cf sshd[7244]: pam_unix(sshd:auth): authentication fai
...
2020-09-21 22:43:07
74.212.247.27 attack
Unauthorized connection attempt from IP address 74.212.247.27 on Port 445(SMB)
2020-09-21 22:44:19
94.102.51.95 attackspambots
 TCP (SYN) 94.102.51.95:44170 -> port 15998, len 44
2020-09-21 22:41:54
212.33.204.56 attackspam
Sep 21 12:01:47 vps639187 sshd\[18899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.33.204.56  user=root
Sep 21 12:01:47 vps639187 sshd\[18897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.33.204.56  user=root
Sep 21 12:01:48 vps639187 sshd\[18901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.33.204.56  user=root
...
2020-09-21 22:56:55
1.119.153.110 attackspambots
(sshd) Failed SSH login from 1.119.153.110 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 21 10:10:00 server sshd[14641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.119.153.110  user=root
Sep 21 10:10:01 server sshd[14641]: Failed password for root from 1.119.153.110 port 59608 ssh2
Sep 21 10:18:31 server sshd[17489]: Invalid user ftptest from 1.119.153.110 port 43666
Sep 21 10:18:33 server sshd[17489]: Failed password for invalid user ftptest from 1.119.153.110 port 43666 ssh2
Sep 21 10:21:01 server sshd[18521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.119.153.110  user=root
2020-09-21 23:04:10
185.82.126.148 attack
20 attempts against mh_ha-misbehave-ban on oak
2020-09-21 22:57:11
138.197.19.166 attackspam
Repeated brute force against a port
2020-09-21 23:04:59

Recently Reported IPs

73.251.63.8 136.114.13.223 207.79.182.45 226.53.127.28
94.218.219.110 131.226.234.98 50.236.188.94 39.188.171.25
230.183.183.161 150.84.88.218 162.191.148.56 31.238.54.170
196.164.181.56 64.232.56.226 51.68.117.236 198.226.47.38
70.21.159.81 177.187.141.102 218.69.236.154 21.157.167.192