Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.162.85.36
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12528
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.162.85.36.			IN	A

;; AUTHORITY SECTION:
.			397	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 12:37:32 CST 2022
;; MSG SIZE  rcvd: 106
Host info
36.85.162.139.in-addr.arpa domain name pointer i-tm.com.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
36.85.162.139.in-addr.arpa	name = i-tm.com.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.155 attackspam
k+ssh-bruteforce
2019-12-04 18:46:09
175.5.55.66 attack
FTP Brute Force
2019-12-04 18:48:49
192.159.67.93 attackbots
Port scan on 3 port(s): 2376 2377 4243
2019-12-04 18:32:20
116.196.94.108 attack
Dec  4 09:36:48 MK-Soft-VM3 sshd[10453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.94.108 
Dec  4 09:36:49 MK-Soft-VM3 sshd[10453]: Failed password for invalid user sangka from 116.196.94.108 port 42636 ssh2
...
2019-12-04 18:55:59
187.108.207.43 attackbots
Lines containing failures of 187.108.207.43
Dec  4 00:28:50 keyhelp sshd[9171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.108.207.43  user=daemon
Dec  4 00:28:52 keyhelp sshd[9171]: Failed password for daemon from 187.108.207.43 port 47549 ssh2
Dec  4 00:28:52 keyhelp sshd[9171]: Received disconnect from 187.108.207.43 port 47549:11: Bye Bye [preauth]
Dec  4 00:28:52 keyhelp sshd[9171]: Disconnected from authenticating user daemon 187.108.207.43 port 47549 [preauth]
Dec  4 00:38:51 keyhelp sshd[12433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.108.207.43  user=mysql
Dec  4 00:38:54 keyhelp sshd[12433]: Failed password for mysql from 187.108.207.43 port 45778 ssh2
Dec  4 00:38:54 keyhelp sshd[12433]: Received disconnect from 187.108.207.43 port 45778:11: Bye Bye [preauth]
Dec  4 00:38:54 keyhelp sshd[12433]: Disconnected from authenticating user mysql 187.108.207.43 port 45........
------------------------------
2019-12-04 18:28:43
222.186.175.167 attack
Dec  4 11:45:54 h2177944 sshd\[3808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167  user=root
Dec  4 11:45:56 h2177944 sshd\[3808\]: Failed password for root from 222.186.175.167 port 21628 ssh2
Dec  4 11:45:59 h2177944 sshd\[3808\]: Failed password for root from 222.186.175.167 port 21628 ssh2
Dec  4 11:46:03 h2177944 sshd\[3808\]: Failed password for root from 222.186.175.167 port 21628 ssh2
...
2019-12-04 18:46:44
221.160.100.14 attack
Dec  4 08:36:53 v22018076622670303 sshd\[8108\]: Invalid user zabbix from 221.160.100.14 port 48506
Dec  4 08:36:53 v22018076622670303 sshd\[8108\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.160.100.14
Dec  4 08:36:55 v22018076622670303 sshd\[8108\]: Failed password for invalid user zabbix from 221.160.100.14 port 48506 ssh2
...
2019-12-04 18:26:22
92.50.249.92 attack
SSH bruteforce
2019-12-04 18:49:44
211.159.150.10 attackspambots
Dec  4 10:13:43 ArkNodeAT sshd\[12873\]: Invalid user stell from 211.159.150.10
Dec  4 10:13:43 ArkNodeAT sshd\[12873\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.159.150.10
Dec  4 10:13:45 ArkNodeAT sshd\[12873\]: Failed password for invalid user stell from 211.159.150.10 port 56532 ssh2
2019-12-04 18:40:47
141.62.172.2 attack
Dec  4 00:33:43 hpm sshd\[22954\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.62.172.2  user=root
Dec  4 00:33:46 hpm sshd\[22954\]: Failed password for root from 141.62.172.2 port 52282 ssh2
Dec  4 00:39:15 hpm sshd\[23572\]: Invalid user PlcmSpIp from 141.62.172.2
Dec  4 00:39:15 hpm sshd\[23572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.62.172.2
Dec  4 00:39:17 hpm sshd\[23572\]: Failed password for invalid user PlcmSpIp from 141.62.172.2 port 58648 ssh2
2019-12-04 18:43:57
37.187.122.195 attackbots
Dec  4 11:04:29 vps666546 sshd\[32232\]: Invalid user Vision from 37.187.122.195 port 33872
Dec  4 11:04:29 vps666546 sshd\[32232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.122.195
Dec  4 11:04:31 vps666546 sshd\[32232\]: Failed password for invalid user Vision from 37.187.122.195 port 33872 ssh2
Dec  4 11:11:27 vps666546 sshd\[32479\]: Invalid user hanak from 37.187.122.195 port 45152
Dec  4 11:11:27 vps666546 sshd\[32479\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.122.195
...
2019-12-04 18:36:09
118.25.143.199 attack
Dec  4 08:08:32 legacy sshd[5370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.143.199
Dec  4 08:08:34 legacy sshd[5370]: Failed password for invalid user !!!!!!! from 118.25.143.199 port 54417 ssh2
Dec  4 08:16:04 legacy sshd[5807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.143.199
...
2019-12-04 18:47:23
106.13.145.44 attack
Dec  4 03:26:13 firewall sshd[18765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.145.44
Dec  4 03:26:13 firewall sshd[18765]: Invalid user jeska from 106.13.145.44
Dec  4 03:26:15 firewall sshd[18765]: Failed password for invalid user jeska from 106.13.145.44 port 55820 ssh2
...
2019-12-04 18:52:02
13.94.57.155 attack
<6 unauthorized SSH connections
2019-12-04 18:50:35
132.232.112.25 attack
Dec  4 02:33:36 plusreed sshd[13331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.112.25  user=root
Dec  4 02:33:38 plusreed sshd[13331]: Failed password for root from 132.232.112.25 port 36350 ssh2
...
2019-12-04 18:17:50

Recently Reported IPs

139.162.70.164 139.162.87.229 139.162.89.200 139.162.9.71
139.162.90.30 139.162.91.52 139.162.95.99 139.162.90.4
214.57.72.11 139.162.96.62 139.162.89.70 139.166.209.57
139.170.101.161 139.170.140.212 139.170.2.9 139.170.245.64
139.165.57.26 139.177.185.136 139.170.8.146 139.177.186.173