Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.149.136.188
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59167
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.149.136.188.		IN	A

;; AUTHORITY SECTION:
.			388	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021122900 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 29 15:40:36 CST 2021
;; MSG SIZE  rcvd: 108
Host info
Host 188.136.149.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 188.136.149.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
119.28.73.77 attack
Unauthorized connection attempt detected from IP address 119.28.73.77 to port 2220 [J]
2020-01-31 03:33:47
103.94.170.34 attackbotsspam
Unauthorized connection attempt detected from IP address 103.94.170.34 to port 80 [J]
2020-01-31 03:46:52
77.42.120.26 attack
Unauthorized connection attempt detected from IP address 77.42.120.26 to port 23 [J]
2020-01-31 03:37:13
2.185.155.227 attackbotsspam
Unauthorized connection attempt detected from IP address 2.185.155.227 to port 80 [J]
2020-01-31 03:24:33
142.93.239.197 attackbots
Automatic report - SSH Brute-Force Attack
2020-01-31 03:32:19
186.70.231.30 attackbots
Unauthorized connection attempt detected from IP address 186.70.231.30 to port 5555 [J]
2020-01-31 03:55:14
194.208.93.26 attack
Unauthorized connection attempt detected from IP address 194.208.93.26 to port 80 [J]
2020-01-31 03:26:12
171.39.72.202 attackspam
Unauthorized connection attempt detected from IP address 171.39.72.202 to port 81 [J]
2020-01-31 03:45:14
175.205.248.122 attackbotsspam
Fail2Ban Ban Triggered
2020-01-31 03:44:29
187.111.216.155 attackbots
Unauthorized connection attempt detected from IP address 187.111.216.155 to port 8080 [J]
2020-01-31 03:28:22
49.235.62.222 attackbots
Unauthorized connection attempt detected from IP address 49.235.62.222 to port 2220 [J]
2020-01-31 03:20:22
218.57.15.214 attackbotsspam
Unauthorized connection attempt detected from IP address 218.57.15.214 to port 2220 [J]
2020-01-31 03:51:24
79.112.215.206 attackspam
Unauthorized connection attempt detected from IP address 79.112.215.206 to port 88 [J]
2020-01-31 03:48:45
68.160.238.209 attackspambots
Unauthorized connection attempt detected from IP address 68.160.238.209 to port 80 [J]
2020-01-31 03:19:35
122.51.248.146 attackspam
Jan 30 17:13:42 tuxlinux sshd[21973]: Invalid user sarama from 122.51.248.146 port 39674
Jan 30 17:13:42 tuxlinux sshd[21973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.248.146 
Jan 30 17:13:42 tuxlinux sshd[21973]: Invalid user sarama from 122.51.248.146 port 39674
Jan 30 17:13:42 tuxlinux sshd[21973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.248.146 
Jan 30 17:13:42 tuxlinux sshd[21973]: Invalid user sarama from 122.51.248.146 port 39674
Jan 30 17:13:42 tuxlinux sshd[21973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.248.146 
Jan 30 17:13:44 tuxlinux sshd[21973]: Failed password for invalid user sarama from 122.51.248.146 port 39674 ssh2
...
2020-01-31 03:32:37

Recently Reported IPs

33.108.15.196 114.216.169.63 120.29.192.205 231.109.98.176
182.130.176.4 140.181.211.242 254.46.96.138 45.159.198.92
5.165.192.201 172.189.184.29 206.189.151.65 205.134.133.219
184.74.212.87 77.165.106.91 37.24.198.203 54.49.73.86
44.234.24.201 82.124.61.174 43.89.68.210 240.125.190.241