Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.151.97.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20740
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.151.97.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 02:27:53 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 142.97.151.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.97.151.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
95.59.171.230 attackspam
Brute forcing RDP port 3389
2020-10-11 13:32:00
121.241.244.92 attackbotsspam
Oct 11 03:11:42 vps639187 sshd\[21586\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.241.244.92  user=root
Oct 11 03:11:44 vps639187 sshd\[21586\]: Failed password for root from 121.241.244.92 port 58911 ssh2
Oct 11 03:17:31 vps639187 sshd\[21697\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.241.244.92  user=root
...
2020-10-11 13:36:01
62.234.114.92 attack
SSH auth scanning - multiple failed logins
2020-10-11 13:11:52
220.128.104.169 attackspambots
1602362932 - 10/10/2020 22:48:52 Host: 220.128.104.169/220.128.104.169 Port: 445 TCP Blocked
...
2020-10-11 13:29:33
112.85.42.110 attackbotsspam
Oct 10 19:24:22 sachi sshd\[21508\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.110  user=root
Oct 10 19:24:24 sachi sshd\[21508\]: Failed password for root from 112.85.42.110 port 55240 ssh2
Oct 10 19:24:28 sachi sshd\[21508\]: Failed password for root from 112.85.42.110 port 55240 ssh2
Oct 10 19:24:42 sachi sshd\[21527\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.110  user=root
Oct 10 19:24:44 sachi sshd\[21527\]: Failed password for root from 112.85.42.110 port 47684 ssh2
2020-10-11 13:24:59
141.101.69.167 attack
srv02 DDoS Malware Target(80:http) ..
2020-10-11 13:46:21
176.111.173.12 attackbotsspam
Oct 10 23:37:52 web01.agentur-b-2.de postfix/smtpd[549438]: warning: unknown[176.111.173.12]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 10 23:37:52 web01.agentur-b-2.de postfix/smtpd[549438]: lost connection after AUTH from unknown[176.111.173.12]
Oct 10 23:39:01 web01.agentur-b-2.de postfix/smtpd[549172]: warning: unknown[176.111.173.12]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 10 23:39:01 web01.agentur-b-2.de postfix/smtpd[549172]: lost connection after AUTH from unknown[176.111.173.12]
Oct 10 23:45:12 web01.agentur-b-2.de postfix/smtpd[549438]: warning: unknown[176.111.173.12]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-10-11 13:19:31
159.89.9.22 attackspambots
Oct 11 06:41:26 [host] sshd[25889]: pam_unix(sshd:
Oct 11 06:41:28 [host] sshd[25889]: Failed passwor
Oct 11 06:44:50 [host] sshd[25948]: Invalid user p
2020-10-11 13:23:36
220.90.23.22 attack
Port Scan: TCP/443
2020-10-11 13:12:59
103.238.69.138 attackbots
Failed password for invalid user tribox from 103.238.69.138 port 50214 ssh2
2020-10-11 13:16:59
104.168.214.53 attack
5x Failed Password
2020-10-11 13:35:31
139.217.218.93 attackbotsspam
Oct 10 17:25:52 pixelmemory sshd[4179150]: Failed password for root from 139.217.218.93 port 39378 ssh2
Oct 10 17:28:33 pixelmemory sshd[4194160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.217.218.93  user=root
Oct 10 17:28:35 pixelmemory sshd[4194160]: Failed password for root from 139.217.218.93 port 49982 ssh2
Oct 10 17:31:12 pixelmemory sshd[4074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.217.218.93  user=root
Oct 10 17:31:14 pixelmemory sshd[4074]: Failed password for root from 139.217.218.93 port 60574 ssh2
...
2020-10-11 13:21:04
49.232.133.186 attackbotsspam
Oct 11 05:19:33 ns382633 sshd\[22911\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.133.186  user=root
Oct 11 05:19:35 ns382633 sshd\[22911\]: Failed password for root from 49.232.133.186 port 37116 ssh2
Oct 11 05:35:31 ns382633 sshd\[26870\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.133.186  user=root
Oct 11 05:35:32 ns382633 sshd\[26870\]: Failed password for root from 49.232.133.186 port 45114 ssh2
Oct 11 05:39:44 ns382633 sshd\[28066\]: Invalid user system from 49.232.133.186 port 33896
Oct 11 05:39:44 ns382633 sshd\[28066\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.133.186
2020-10-11 13:26:39
49.88.112.70 attack
Oct 11 07:40:07 buvik sshd[27746]: Failed password for root from 49.88.112.70 port 44140 ssh2
Oct 11 07:40:10 buvik sshd[27746]: Failed password for root from 49.88.112.70 port 44140 ssh2
Oct 11 07:40:12 buvik sshd[27746]: Failed password for root from 49.88.112.70 port 44140 ssh2
...
2020-10-11 13:44:40
222.186.30.57 attack
Unauthorized connection attempt detected from IP address 222.186.30.57 to port 22 [T]
2020-10-11 13:37:22

Recently Reported IPs

149.238.215.75 244.175.2.40 104.118.121.89 229.157.64.77
233.105.201.31 72.189.164.69 175.166.72.34 38.135.214.178
62.48.170.73 104.31.91.133 206.199.180.165 35.10.179.115
8.112.228.36 100.130.165.78 71.241.78.212 15.13.155.188
58.210.130.168 168.15.226.209 233.179.142.13 226.149.225.169