Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: New Zealand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.180.114.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46185
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.180.114.55.			IN	A

;; AUTHORITY SECTION:
.			227	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020081601 1800 900 604800 86400

;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Aug 17 04:48:22 CST 2020
;; MSG SIZE  rcvd: 118
Host info
55.114.180.139.in-addr.arpa domain name pointer ip-139-180-114-55.kinect.net.nz.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
55.114.180.139.in-addr.arpa	name = ip-139-180-114-55.kinect.net.nz.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
199.195.254.80 attackspambots
Invalid user fake from 199.195.254.80 port 32772
2020-02-13 21:12:49
31.14.255.133 attackspambots
[Thu Feb 13 08:22:22.376932 2020] [proxy_fcgi:error] [pid 16318:tid 139634705110784] [client 31.14.255.133:41728] AH01071: Got error 'Primary script unknown\n'
2020-02-13 21:10:07
147.135.71.43 attackbots
$f2bV_matches
2020-02-13 21:38:11
88.133.140.12 attack
Feb 13 07:15:05 vps691689 sshd[25807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.133.140.12
Feb 13 07:15:08 vps691689 sshd[25807]: Failed password for invalid user sugar from 88.133.140.12 port 58762 ssh2
...
2020-02-13 20:47:02
49.88.112.67 attack
Feb 13 13:50:57 v22018053744266470 sshd[25202]: Failed password for root from 49.88.112.67 port 26600 ssh2
Feb 13 13:52:05 v22018053744266470 sshd[25278]: Failed password for root from 49.88.112.67 port 17546 ssh2
Feb 13 13:52:07 v22018053744266470 sshd[25278]: Failed password for root from 49.88.112.67 port 17546 ssh2
...
2020-02-13 21:05:49
194.190.86.76 attackspam
Unauthorized connection attempt from IP address 194.190.86.76 on Port 445(SMB)
2020-02-13 21:30:17
93.94.145.24 attackbotsspam
unauthorized connection attempt
2020-02-13 21:25:37
59.90.201.11 attackbotsspam
Unauthorized connection attempt from IP address 59.90.201.11 on Port 445(SMB)
2020-02-13 20:56:32
101.91.160.243 attackbots
Invalid user rid from 101.91.160.243 port 49718
2020-02-13 21:11:44
177.75.0.210 attackbots
Unauthorized connection attempt from IP address 177.75.0.210 on Port 445(SMB)
2020-02-13 21:09:41
62.234.66.50 attackbots
Feb 13 09:01:09 mout sshd[25457]: Invalid user test from 62.234.66.50 port 58640
2020-02-13 20:44:59
218.64.226.43 attack
Unauthorized connection attempt from IP address 218.64.226.43 on Port 445(SMB)
2020-02-13 21:20:14
187.109.10.100 attackspambots
Feb 13 05:43:29 icinga sshd[51772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.109.10.100 
Feb 13 05:43:32 icinga sshd[51772]: Failed password for invalid user jill from 187.109.10.100 port 36296 ssh2
Feb 13 05:45:40 icinga sshd[53631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.109.10.100 
...
2020-02-13 21:07:31
70.37.92.195 attackspambots
Spam attempts
2020-02-13 21:24:44
82.252.134.244 attack
unauthorized connection attempt
2020-02-13 21:04:37

Recently Reported IPs

124.19.65.28 183.89.26.208 138.246.109.66 170.119.24.214
209.48.162.135 131.202.145.124 139.45.196.75 211.186.198.157
92.115.165.144 53.169.207.193 59.76.152.226 132.83.70.39
137.43.140.50 33.208.163.181 183.117.20.118 192.163.206.108
53.12.98.180 154.181.41.118 58.74.159.110 237.126.173.96