Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Frankfurt am Main

Region: Hessen

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.144.67.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33850
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.144.67.117.			IN	A

;; AUTHORITY SECTION:
.			440	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023021300 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 13 22:04:11 CST 2023
;; MSG SIZE  rcvd: 107
Host info
117.67.144.139.in-addr.arpa domain name pointer 139-144-67-117.ip.linodeusercontent.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
117.67.144.139.in-addr.arpa	name = 139-144-67-117.ip.linodeusercontent.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
123.207.74.24 attack
Oct 21 05:16:42 hcbbdb sshd\[18212\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.74.24  user=root
Oct 21 05:16:43 hcbbdb sshd\[18212\]: Failed password for root from 123.207.74.24 port 35984 ssh2
Oct 21 05:21:38 hcbbdb sshd\[18703\]: Invalid user easy from 123.207.74.24
Oct 21 05:21:38 hcbbdb sshd\[18703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.74.24
Oct 21 05:21:40 hcbbdb sshd\[18703\]: Failed password for invalid user easy from 123.207.74.24 port 44454 ssh2
2019-10-21 13:53:27
125.161.129.72 attack
Honeypot attack, port: 445, PTR: 72.subnet125-161-129.speedy.telkom.net.id.
2019-10-21 14:06:14
178.128.21.57 attackspambots
$f2bV_matches
2019-10-21 13:50:52
45.45.45.45 attack
21.10.2019 03:54:07 Recursive DNS scan
2019-10-21 13:20:58
36.155.113.73 attackbotsspam
F2B jail: sshd. Time: 2019-10-21 07:04:12, Reported by: VKReport
2019-10-21 13:16:36
139.59.3.151 attack
$f2bV_matches
2019-10-21 13:42:26
186.115.82.105 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-10-21 13:27:43
187.162.4.48 attackbotsspam
Automatic report - Port Scan Attack
2019-10-21 13:18:06
180.250.248.39 attackspam
Oct 20 19:28:02 eddieflores sshd\[31093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.248.39  user=root
Oct 20 19:28:03 eddieflores sshd\[31093\]: Failed password for root from 180.250.248.39 port 38684 ssh2
Oct 20 19:32:53 eddieflores sshd\[31466\]: Invalid user udo from 180.250.248.39
Oct 20 19:32:53 eddieflores sshd\[31466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.248.39
Oct 20 19:32:55 eddieflores sshd\[31466\]: Failed password for invalid user udo from 180.250.248.39 port 49018 ssh2
2019-10-21 13:50:23
110.136.167.53 attackbotsspam
Automatic report - Port Scan Attack
2019-10-21 14:07:43
185.105.121.55 attack
Oct 21 05:47:07 ncomp sshd[22477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.105.121.55  user=root
Oct 21 05:47:09 ncomp sshd[22477]: Failed password for root from 185.105.121.55 port 18932 ssh2
Oct 21 05:53:37 ncomp sshd[22555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.105.121.55  user=root
Oct 21 05:53:38 ncomp sshd[22555]: Failed password for root from 185.105.121.55 port 63300 ssh2
2019-10-21 13:45:00
78.108.217.2 attack
Tried sshing with brute force.
2019-10-21 13:29:08
106.12.17.169 attack
SSH invalid-user multiple login attempts
2019-10-21 13:53:07
101.36.138.61 attack
2019-10-21T03:53:33.694329abusebot-7.cloudsearch.cf sshd\[26683\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.138.61  user=root
2019-10-21 13:49:49
200.107.202.20 attackspambots
Honeypot attack, port: 445, PTR: customer-static-200.107.202.20.redynet.com.ar.
2019-10-21 13:49:30

Recently Reported IPs

31.165.89.181 103.71.79.184 89.248.206.2 103.108.94.238
193.107.123.210 149.76.39.56 139.201.110.254 191.104.89.253
255.153.246.85 223.102.138.44 4.174.208.111 153.212.44.23
154.6.13.152 18.62.59.73 47.192.190.49 16.240.135.6
174.104.208.193 97.151.236.216 101.202.71.15 59.2.251.9