Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Singapore

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.180.145.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43858
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.180.145.12.			IN	A

;; AUTHORITY SECTION:
.			558	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:12:26 CST 2022
;; MSG SIZE  rcvd: 107
Host info
12.145.180.139.in-addr.arpa domain name pointer 139.180.145.12.vultr.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
12.145.180.139.in-addr.arpa	name = 139.180.145.12.vultr.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
123.134.49.163 attack
firewall-block, port(s): 2323/tcp
2020-10-02 05:36:20
128.199.123.0 attackbotsspam
Oct  1 12:21:13 plex-server sshd[1590372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.123.0 
Oct  1 12:21:13 plex-server sshd[1590372]: Invalid user max from 128.199.123.0 port 39184
Oct  1 12:21:15 plex-server sshd[1590372]: Failed password for invalid user max from 128.199.123.0 port 39184 ssh2
Oct  1 12:24:56 plex-server sshd[1591872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.123.0  user=root
Oct  1 12:24:59 plex-server sshd[1591872]: Failed password for root from 128.199.123.0 port 38426 ssh2
...
2020-10-02 05:37:35
84.13.44.212 attack
Oct  1 20:19:53 s2 sshd[21272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.13.44.212 
Oct  1 20:19:53 s2 sshd[21273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.13.44.212 
Oct  1 20:19:55 s2 sshd[21272]: Failed password for invalid user pi from 84.13.44.212 port 54866 ssh2
2020-10-02 05:02:59
27.207.8.34 attack
Port Scan: TCP/23
2020-10-02 05:31:42
211.24.100.128 attackspambots
$f2bV_matches
2020-10-02 05:35:14
189.50.87.58 attack
firewall-block, port(s): 445/tcp
2020-10-02 05:29:09
199.195.254.38 attackbots
400 BAD REQUEST
2020-10-02 05:24:52
208.86.163.70 attackbotsspam
$f2bV_matches
2020-10-02 05:15:50
102.37.40.61 attackspambots
DATE:2020-10-01 22:58:55,IP:102.37.40.61,MATCHES:10,PORT:ssh
2020-10-02 05:17:46
20.191.88.144 attackbots
Oct  1 16:30:07 dignus sshd[29015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.191.88.144
Oct  1 16:30:09 dignus sshd[29015]: Failed password for invalid user teste from 20.191.88.144 port 43754 ssh2
Oct  1 16:34:40 dignus sshd[29440]: Invalid user appldev from 20.191.88.144 port 54278
Oct  1 16:34:40 dignus sshd[29440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.191.88.144
Oct  1 16:34:42 dignus sshd[29440]: Failed password for invalid user appldev from 20.191.88.144 port 54278 ssh2
...
2020-10-02 05:07:05
196.52.43.104 attack
Icarus honeypot on github
2020-10-02 05:25:56
128.90.182.123 attack
Failed password for invalid user from 128.90.182.123 port 54117 ssh2
2020-10-02 05:18:51
106.13.45.212 attack
Invalid user tester from 106.13.45.212 port 53136
2020-10-02 05:19:42
81.120.65.55 attack
20 attempts against mh-misbehave-ban on flame
2020-10-02 05:28:44
168.63.72.135 attackspambots
Brute forcing email accounts
2020-10-02 05:38:53

Recently Reported IPs

139.180.144.242 139.180.145.1 139.180.144.87 139.180.145.128
118.233.73.230 118.235.199.185 118.236.173.172 118.236.217.16
118.237.177.2 118.237.35.43 82.210.245.249 118.237.87.115
139.180.159.91 139.180.160.90 139.180.159.77 139.180.160.255
139.180.161.222 139.180.161.142 139.180.160.46 139.180.161.146