Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bath

Region: Maine

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.140.105.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6815
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.140.105.136.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 11:11:48 CST 2025
;; MSG SIZE  rcvd: 108
Host info
136.105.140.139.in-addr.arpa is an alias for 136.105.140.139.druck-academic.dyn.140.139.in-addr.arpa.
136.105.140.139.druck-academic.dyn.140.139.in-addr.arpa domain name pointer DESKTOP-H6QS8Q2.campus.bowdoin.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
136.105.140.139.in-addr.arpa	canonical name = 136.105.140.139.druck-academic.dyn.140.139.in-addr.arpa.
136.105.140.139.druck-academic.dyn.140.139.in-addr.arpa	name = DESKTOP-H6QS8Q2.campus.bowdoin.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
59.125.159.109 attackbots
fail2ban -- 59.125.159.109
...
2020-03-21 01:10:17
209.211.200.38 attackspam
03/20/2020-09:36:14.892222 209.211.200.38 Protocol: 6 ET SCAN Potential SSH Scan
2020-03-21 02:12:06
222.186.180.6 attackbots
Mar 20 18:42:23 santamaria sshd\[8083\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.6  user=root
Mar 20 18:42:25 santamaria sshd\[8083\]: Failed password for root from 222.186.180.6 port 10038 ssh2
Mar 20 18:42:28 santamaria sshd\[8083\]: Failed password for root from 222.186.180.6 port 10038 ssh2
...
2020-03-21 01:47:53
213.91.211.105 attackbotsspam
Automatic report - Port Scan Attack
2020-03-21 01:50:27
140.238.161.208 attack
trying to access non-authorized port
2020-03-21 02:09:00
210.99.216.205 attackspambots
Brute-force attempt banned
2020-03-21 01:54:47
163.172.113.19 attack
Mar 20 17:55:01 markkoudstaal sshd[27478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.113.19
Mar 20 17:55:04 markkoudstaal sshd[27478]: Failed password for invalid user ss from 163.172.113.19 port 48958 ssh2
Mar 20 18:02:39 markkoudstaal sshd[28543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.113.19
2020-03-21 01:13:12
139.170.150.250 attackspambots
Brute-force attempt banned
2020-03-21 02:13:54
222.186.31.166 attackbotsspam
(sshd) Failed SSH login from 222.186.31.166 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 20 18:05:59 elude sshd[20004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.166  user=root
Mar 20 18:06:01 elude sshd[20004]: Failed password for root from 222.186.31.166 port 54235 ssh2
Mar 20 18:06:03 elude sshd[20004]: Failed password for root from 222.186.31.166 port 54235 ssh2
Mar 20 18:06:06 elude sshd[20004]: Failed password for root from 222.186.31.166 port 54235 ssh2
Mar 20 19:02:42 elude sshd[23304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.166  user=root
2020-03-21 02:04:11
203.143.12.26 attackbots
SSH login attempts brute force.
2020-03-21 01:56:28
222.186.30.218 attack
Mar 20 14:15:31 firewall sshd[3089]: Failed password for root from 222.186.30.218 port 29168 ssh2
Mar 20 14:15:33 firewall sshd[3089]: Failed password for root from 222.186.30.218 port 29168 ssh2
Mar 20 14:15:35 firewall sshd[3089]: Failed password for root from 222.186.30.218 port 29168 ssh2
...
2020-03-21 01:26:13
51.159.54.102 attackbots
11211/udp
[2020-03-20]1pkt
2020-03-21 02:07:47
222.186.175.220 attack
Mar 21 00:20:27 webhost01 sshd[3791]: Failed password for root from 222.186.175.220 port 53298 ssh2
Mar 21 00:20:41 webhost01 sshd[3791]: error: maximum authentication attempts exceeded for root from 222.186.175.220 port 53298 ssh2 [preauth]
...
2020-03-21 01:21:39
222.186.175.151 attack
Mar 20 22:37:22 gw1 sshd[16780]: Failed password for root from 222.186.175.151 port 34684 ssh2
Mar 20 22:37:35 gw1 sshd[16780]: error: maximum authentication attempts exceeded for root from 222.186.175.151 port 34684 ssh2 [preauth]
...
2020-03-21 01:43:26
108.12.130.32 attackbotsspam
Mar 20 15:13:16 ns37 sshd[19161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.12.130.32
2020-03-21 02:10:31

Recently Reported IPs

200.80.30.46 185.54.124.218 63.254.151.179 206.28.134.64
151.54.241.248 152.151.183.248 69.241.183.219 239.214.20.240
154.160.89.234 151.123.178.185 204.80.167.167 238.74.77.69
68.188.188.168 222.229.104.208 252.209.198.12 119.5.156.38
187.241.227.198 15.188.178.16 13.36.173.254 207.171.229.48