Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Frankfurt am Main

Region: Hessen

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.177.67.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31459
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.177.67.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 08:00:47 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 149.67.177.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.67.177.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
79.104.58.62 attack
Jul 12 05:53:07 rancher-0 sshd[261638]: Invalid user masaco from 79.104.58.62 port 56270
...
2020-07-12 15:22:17
51.91.157.114 attackbots
2020-07-12T09:14:52+02:00 Pandore sshd[13939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.157.114 
...
2020-07-12 15:28:14
37.49.230.133 attackbots
 TCP (SYN) 37.49.230.133:40030 -> port 22, len 44
2020-07-12 15:27:20
121.229.13.181 attackspambots
Jul 12 06:34:20 scw-6657dc sshd[12335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.229.13.181
Jul 12 06:34:20 scw-6657dc sshd[12335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.229.13.181
Jul 12 06:34:22 scw-6657dc sshd[12335]: Failed password for invalid user ch from 121.229.13.181 port 44916 ssh2
...
2020-07-12 15:20:28
49.233.171.219 attackspambots
leo_www
2020-07-12 14:54:28
187.74.217.152 attackbotsspam
2020-07-12T01:41:42.4825191495-001 sshd[49903]: Invalid user djmeero from 187.74.217.152 port 41536
2020-07-12T01:41:44.2293581495-001 sshd[49903]: Failed password for invalid user djmeero from 187.74.217.152 port 41536 ssh2
2020-07-12T01:43:20.5476961495-001 sshd[49976]: Invalid user gk from 187.74.217.152 port 59382
2020-07-12T01:43:20.5515451495-001 sshd[49976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.74.217.152
2020-07-12T01:43:20.5476961495-001 sshd[49976]: Invalid user gk from 187.74.217.152 port 59382
2020-07-12T01:43:22.4155461495-001 sshd[49976]: Failed password for invalid user gk from 187.74.217.152 port 59382 ssh2
...
2020-07-12 15:19:27
106.12.146.9 attackbots
2020-07-12T05:50:26.448438vps751288.ovh.net sshd\[3829\]: Invalid user cody from 106.12.146.9 port 50580
2020-07-12T05:50:26.457742vps751288.ovh.net sshd\[3829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.146.9
2020-07-12T05:50:28.703854vps751288.ovh.net sshd\[3829\]: Failed password for invalid user cody from 106.12.146.9 port 50580 ssh2
2020-07-12T05:53:10.429257vps751288.ovh.net sshd\[3863\]: Invalid user jkchen from 106.12.146.9 port 58176
2020-07-12T05:53:10.441598vps751288.ovh.net sshd\[3863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.146.9
2020-07-12 15:19:41
185.175.93.23 attackspambots
Jul 12 08:23:55 debian-2gb-nbg1-2 kernel: \[16793615.962060\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.175.93.23 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=26796 PROTO=TCP SPT=51376 DPT=5919 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-12 14:55:12
200.83.231.100 attackspambots
Jul 12 03:34:59 ws22vmsma01 sshd[72012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.83.231.100
Jul 12 03:35:01 ws22vmsma01 sshd[72012]: Failed password for invalid user gretchen from 200.83.231.100 port 9870 ssh2
...
2020-07-12 15:29:58
65.49.20.68 attackspam
Unauthorized connection attempt detected from IP address 65.49.20.68 to port 22
2020-07-12 15:12:28
45.143.220.79 attackspambots
<6 unauthorized SSH connections
2020-07-12 15:34:26
167.172.153.137 attackbotsspam
Jul 12 08:48:23 server sshd[14518]: Failed password for invalid user nknoh from 167.172.153.137 port 57600 ssh2
Jul 12 08:51:51 server sshd[17489]: Failed password for invalid user a2it from 167.172.153.137 port 55776 ssh2
Jul 12 08:55:17 server sshd[20284]: Failed password for invalid user admin from 167.172.153.137 port 53954 ssh2
2020-07-12 15:09:17
111.65.156.56 attackbotsspam
Unauthorised access (Jul 12) SRC=111.65.156.56 LEN=40 TTL=53 ID=51490 TCP DPT=23 WINDOW=46220 SYN
2020-07-12 15:27:39
170.106.33.194 attackbotsspam
(sshd) Failed SSH login from 170.106.33.194 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 12 09:52:01 s1 sshd[23507]: Invalid user admin from 170.106.33.194 port 54814
Jul 12 09:52:03 s1 sshd[23507]: Failed password for invalid user admin from 170.106.33.194 port 54814 ssh2
Jul 12 09:57:01 s1 sshd[23631]: Invalid user admin from 170.106.33.194 port 51138
Jul 12 09:57:03 s1 sshd[23631]: Failed password for invalid user admin from 170.106.33.194 port 51138 ssh2
Jul 12 10:06:06 s1 sshd[23863]: Invalid user eric from 170.106.33.194 port 41084
2020-07-12 15:34:05
45.162.123.9 attack
Lines containing failures of 45.162.123.9
Jul 10 06:50:15 icinga sshd[31648]: Invalid user morikazu from 45.162.123.9 port 37545
Jul 10 06:50:15 icinga sshd[31648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.162.123.9
Jul 10 06:50:17 icinga sshd[31648]: Failed password for invalid user morikazu from 45.162.123.9 port 37545 ssh2
Jul 10 06:50:17 icinga sshd[31648]: Received disconnect from 45.162.123.9 port 37545:11: Bye Bye [preauth]
Jul 10 06:50:17 icinga sshd[31648]: Disconnected from invalid user morikazu 45.162.123.9 port 37545 [preauth]
Jul 10 07:08:34 icinga sshd[4171]: Invalid user oracle from 45.162.123.9 port 48548
Jul 10 07:08:34 icinga sshd[4171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.162.123.9


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=45.162.123.9
2020-07-12 15:33:18

Recently Reported IPs

143.172.111.192 235.211.193.117 85.252.103.195 219.4.119.50
14.239.162.28 130.11.230.233 247.112.119.200 39.188.193.9
101.60.92.194 227.47.48.66 231.140.159.48 32.192.246.60
33.243.189.226 216.90.148.90 233.188.228.185 161.69.243.173
81.13.124.140 24.100.84.108 164.75.246.241 82.85.117.174