Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.146.148.217
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59197
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.146.148.217.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 10:32:48 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 217.148.146.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 217.148.146.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
91.121.177.192 attackspam
Jun 14 08:49:15 * sshd[32514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.177.192
Jun 14 08:49:17 * sshd[32514]: Failed password for invalid user pub from 91.121.177.192 port 56860 ssh2
2020-06-14 17:32:22
121.189.174.65 attackspam
" "
2020-06-14 17:23:30
185.210.217.12 attackbotsspam
0,39-01/02 [bc04/m81] PostRequest-Spammer scoring: zurich
2020-06-14 17:29:21
193.32.126.161 attackspambots
srv02 SSH BruteForce Attacks 22 ..
2020-06-14 17:33:27
121.46.244.194 attackbotsspam
Jun 14 10:04:44 abendstille sshd\[28148\]: Invalid user uais533 from 121.46.244.194
Jun 14 10:04:44 abendstille sshd\[28148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.46.244.194
Jun 14 10:04:46 abendstille sshd\[28148\]: Failed password for invalid user uais533 from 121.46.244.194 port 56891 ssh2
Jun 14 10:07:10 abendstille sshd\[30107\]: Invalid user guest from 121.46.244.194
Jun 14 10:07:10 abendstille sshd\[30107\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.46.244.194
...
2020-06-14 18:04:02
36.76.75.167 attackbotsspam
1592106498 - 06/14/2020 05:48:18 Host: 36.76.75.167/36.76.75.167 Port: 445 TCP Blocked
2020-06-14 18:00:51
92.63.194.104 attack
Port scanning
2020-06-14 17:43:53
134.122.20.113 attackspam
Jun 14 09:00:43 vlre-nyc-1 sshd\[15991\]: Invalid user haisou from 134.122.20.113
Jun 14 09:00:43 vlre-nyc-1 sshd\[15991\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.20.113
Jun 14 09:00:46 vlre-nyc-1 sshd\[15991\]: Failed password for invalid user haisou from 134.122.20.113 port 60020 ssh2
Jun 14 09:03:57 vlre-nyc-1 sshd\[16103\]: Invalid user user03 from 134.122.20.113
Jun 14 09:03:57 vlre-nyc-1 sshd\[16103\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.20.113
...
2020-06-14 17:46:51
167.172.185.179 attack
Jun 14 08:27:34 vps333114 sshd[23065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.185.179
Jun 14 08:27:36 vps333114 sshd[23065]: Failed password for invalid user awr from 167.172.185.179 port 60220 ssh2
...
2020-06-14 18:04:17
14.20.188.60 attackbots
Brute force attempt
2020-06-14 17:49:39
128.199.143.47 attackbotsspam
2020-06-14T01:48:05.4878351495-001 sshd[56896]: Failed password for invalid user asf from 128.199.143.47 port 55530 ssh2
2020-06-14T01:52:01.8734361495-001 sshd[57010]: Invalid user cxv from 128.199.143.47 port 57168
2020-06-14T01:52:01.8765691495-001 sshd[57010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.143.47
2020-06-14T01:52:01.8734361495-001 sshd[57010]: Invalid user cxv from 128.199.143.47 port 57168
2020-06-14T01:52:03.2377581495-001 sshd[57010]: Failed password for invalid user cxv from 128.199.143.47 port 57168 ssh2
2020-06-14T01:55:53.2434041495-001 sshd[57154]: Invalid user xguest from 128.199.143.47 port 58808
...
2020-06-14 17:43:00
54.37.198.243 attackspambots
Automatic report - XMLRPC Attack
2020-06-14 17:39:43
192.144.230.221 attackspam
Failed password for invalid user shaca from 192.144.230.221 port 52788 ssh2
2020-06-14 18:02:09
125.167.59.127 attack
DATE:2020-06-14 05:48:33, IP:125.167.59.127, PORT:5900 VNC brute force auth on honeypot server (epe-honey1-hq)
2020-06-14 17:48:48
218.92.0.138 attackspambots
Jun 14 05:26:57 NPSTNNYC01T sshd[12020]: Failed password for root from 218.92.0.138 port 19800 ssh2
Jun 14 05:27:10 NPSTNNYC01T sshd[12020]: error: maximum authentication attempts exceeded for root from 218.92.0.138 port 19800 ssh2 [preauth]
Jun 14 05:27:17 NPSTNNYC01T sshd[12028]: Failed password for root from 218.92.0.138 port 44249 ssh2
...
2020-06-14 17:38:47

Recently Reported IPs

148.116.174.94 5.98.185.91 142.222.75.189 116.165.251.42
205.124.155.235 114.140.101.88 26.162.78.39 122.77.52.103
9.49.191.187 190.76.113.255 221.243.74.61 195.172.109.252
44.246.105.77 74.57.38.243 201.99.91.228 33.102.66.171
206.194.58.222 155.113.48.197 22.6.75.185 53.51.12.0