Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.150.166.181
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17411
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.150.166.181.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030101 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 02 07:24:41 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 181.166.150.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 181.166.150.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
171.224.178.140 attackspambots
Unauthorized connection attempt from IP address 171.224.178.140 on Port 445(SMB)
2020-02-22 01:50:31
84.44.236.226 attack
firewall-block, port(s): 22/tcp
2020-02-22 01:54:58
201.249.88.124 attackbots
Feb 21 07:09:23 askasleikir sshd[38978]: Failed password for invalid user jozef from 201.249.88.124 port 41515 ssh2
2020-02-22 01:44:34
188.130.149.65 attack
suspicious action Fri, 21 Feb 2020 10:14:42 -0300
2020-02-22 02:05:40
190.104.112.170 attackspambots
Unauthorized connection attempt from IP address 190.104.112.170 on Port 445(SMB)
2020-02-22 01:46:13
192.241.128.214 attackbots
Feb 21 13:34:05 XXX sshd[37797]: Invalid user caikj from 192.241.128.214 port 34889
2020-02-22 01:56:55
45.73.125.124 attack
Feb 21 16:18:55 MK-Soft-VM5 sshd[22648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.73.125.124 
Feb 21 16:18:57 MK-Soft-VM5 sshd[22648]: Failed password for invalid user sftp from 45.73.125.124 port 37812 ssh2
...
2020-02-22 01:39:01
109.160.76.10 attackspam
Unauthorized connection attempt from IP address 109.160.76.10 on Port 445(SMB)
2020-02-22 01:48:32
128.201.8.254 attack
suspicious action Fri, 21 Feb 2020 10:15:29 -0300
2020-02-22 01:38:25
87.241.107.62 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-02-22 01:40:02
191.30.44.41 attackbotsspam
Automatic report - Port Scan Attack
2020-02-22 02:05:18
42.238.134.37 attackbots
port scan and connect, tcp 23 (telnet)
2020-02-22 02:07:49
58.118.24.4 attackspambots
suspicious action Fri, 21 Feb 2020 10:15:15 -0300
2020-02-22 01:45:55
222.232.29.235 attack
suspicious action Fri, 21 Feb 2020 12:46:58 -0300
2020-02-22 02:03:35
94.28.31.131 attackbotsspam
Feb 21 14:49:01 meumeu sshd[32626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.28.31.131 
Feb 21 14:49:02 meumeu sshd[32626]: Failed password for invalid user mssql from 94.28.31.131 port 38234 ssh2
Feb 21 14:57:41 meumeu sshd[1091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.28.31.131 
...
2020-02-22 02:01:49

Recently Reported IPs

115.45.200.60 43.123.70.179 136.111.183.48 145.73.42.15
36.182.217.31 85.112.148.136 54.231.238.52 223.104.87.211
174.223.69.208 132.122.184.91 70.148.250.140 2001:8a0:5789:7f01:4082:5b96:fc9e:53f9
9.128.52.79 34.43.137.5 250.162.188.31 83.250.220.13
137.237.29.198 164.111.93.29 250.80.153.128 172.172.240.231