Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: Choopa LLC

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackbotsspam
Looking for resource vulnerabilities
2019-08-02 11:56:45
attack
Looking for resource vulnerabilities
2019-06-23 20:37:28
attack
NAME : CHOOPALLC-AP CIDR : 139.180.192.0/19 | STATUS : 200 ROBOT {Looking for resource vulnerabilities} DDoS Attack United States - block certain countries :) IP: 139.180.213.200  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-06-22 18:45:22
Comments on same subnet:
IP Type Details Datetime
139.180.213.55 attackspam
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-09-28T05:16:24Z and 2020-09-28T07:04:47Z
2020-09-29 02:34:28
139.180.213.55 attack
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-09-28T05:16:24Z and 2020-09-28T07:04:47Z
2020-09-28 18:41:40
139.180.213.55 attackspambots
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-08-12T20:54:26Z and 2020-08-12T21:01:43Z
2020-08-13 07:33:30
139.180.213.55 attackbots
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-08-12T12:21:22Z and 2020-08-12T12:42:19Z
2020-08-12 22:27:44
139.180.213.55 attack
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-07-31T20:06:02Z and 2020-07-31T20:32:53Z
2020-08-01 05:47:52
139.180.213.55 attackspam
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-07-25T07:32:47Z and 2020-07-25T07:54:00Z
2020-07-25 16:02:27
139.180.213.55 attack
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-07-20T19:27:14Z and 2020-07-20T20:41:48Z
2020-07-21 07:32:56
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.180.213.200
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45783
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.180.213.200.		IN	A

;; AUTHORITY SECTION:
.			1450	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062201 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jun 22 18:45:14 CST 2019
;; MSG SIZE  rcvd: 119
Host info
200.213.180.139.in-addr.arpa domain name pointer 139.180.213.200.vultr.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
200.213.180.139.in-addr.arpa	name = 139.180.213.200.vultr.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
129.213.123.219 attackspam
SSH Brute Force
2020-04-23 18:10:18
14.177.239.168 attackbots
SSH Brute Force
2020-04-23 18:34:17
51.83.57.157 attackbotsspam
SSH Brute Force
2020-04-23 18:14:33
93.124.17.118 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 86 - port: 23 proto: TCP cat: Misc Attack
2020-04-23 18:42:18
178.128.215.16 attack
2020-04-22 UTC: (20x) - admin(2x),git(2x),hadoop,hf,root(11x),test2,uv,yh
2020-04-23 18:20:37
115.78.1.103 attack
SSH Brute Force
2020-04-23 18:12:04
81.246.63.226 attackbots
SSH Brute Force
2020-04-23 18:27:56
35.231.219.146 attack
SSH Brute Force
2020-04-23 18:33:51
116.196.93.81 attackspambots
SSH Brute Force
2020-04-23 18:24:32
51.68.189.69 attackbotsspam
Brute-force attempt banned
2020-04-23 18:30:46
196.220.67.2 attack
SSH Brute Force
2020-04-23 18:18:05
139.99.238.48 attackspam
prod6
...
2020-04-23 18:09:40
188.166.247.82 attack
SSH Brute Force
2020-04-23 18:19:14
116.247.81.99 attackspambots
SSH Brute Force
2020-04-23 18:24:10
175.207.13.22 attackspam
$f2bV_matches
2020-04-23 18:08:34

Recently Reported IPs

113.227.160.237 118.245.37.6 148.158.72.75 211.24.103.165
91.218.175.14 158.174.10.229 143.215.172.79 94.84.54.41
232.200.197.229 125.160.58.74 16.115.46.144 109.216.138.103
18.182.63.13 193.248.201.172 158.168.67.37 103.247.9.62
50.113.15.242 2.152.192.52 58.7.179.32 40.77.167.17