Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Singapore

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
139.180.213.55 attackspam
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-09-28T05:16:24Z and 2020-09-28T07:04:47Z
2020-09-29 02:34:28
139.180.213.55 attack
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-09-28T05:16:24Z and 2020-09-28T07:04:47Z
2020-09-28 18:41:40
139.180.213.55 attackspambots
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-08-12T20:54:26Z and 2020-08-12T21:01:43Z
2020-08-13 07:33:30
139.180.213.55 attackbots
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-08-12T12:21:22Z and 2020-08-12T12:42:19Z
2020-08-12 22:27:44
139.180.213.55 attack
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-07-31T20:06:02Z and 2020-07-31T20:32:53Z
2020-08-01 05:47:52
139.180.213.55 attackspam
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-07-25T07:32:47Z and 2020-07-25T07:54:00Z
2020-07-25 16:02:27
139.180.213.55 attack
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-07-20T19:27:14Z and 2020-07-20T20:41:48Z
2020-07-21 07:32:56
139.180.213.200 attackbotsspam
Looking for resource vulnerabilities
2019-08-02 11:56:45
139.180.213.200 attack
Looking for resource vulnerabilities
2019-06-23 20:37:28
139.180.213.200 attack
NAME : CHOOPALLC-AP CIDR : 139.180.192.0/19 | STATUS : 200 ROBOT {Looking for resource vulnerabilities} DDoS Attack United States - block certain countries :) IP: 139.180.213.200  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-06-22 18:45:22
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.180.213.233
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34007
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.180.213.233.		IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:14:13 CST 2022
;; MSG SIZE  rcvd: 108
Host info
233.213.180.139.in-addr.arpa domain name pointer 139.180.213.233.vultr.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
233.213.180.139.in-addr.arpa	name = 139.180.213.233.vultr.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
119.249.36.7 attack
Seq 2995002506
2019-08-22 16:19:00
60.23.165.251 attack
Seq 2995002506
2019-08-22 16:08:30
119.48.178.127 attackbots
Seq 2995002506
2019-08-22 16:01:40
120.14.164.90 attackspam
Seq 2995002506
2019-08-22 16:18:43
125.111.154.188 attackspam
Seq 2995002506
2019-08-22 16:35:11
218.61.126.46 attackbotsspam
Seq 2995002506
2019-08-22 16:32:20
175.149.76.251 attackspam
Seq 2995002506
2019-08-22 16:15:59
220.192.248.167 attackspam
Seq 2995002506
2019-08-22 15:51:41
113.118.200.52 attack
Seq 2995002506
2019-08-22 16:05:15
119.165.135.41 attack
Seq 2995002506
2019-08-22 15:58:58
116.140.72.10 attackbots
Seq 2995002506
2019-08-22 16:22:49
1.190.120.14 attackbotsspam
Seq 2995002506
2019-08-22 16:31:23
42.86.80.131 attackbots
Seq 2995002506
2019-08-22 16:29:17
42.225.172.133 attack
Seq 2995002506
2019-08-22 16:10:01
182.88.65.196 attackbotsspam
Seq 2995002506
2019-08-22 15:53:42

Recently Reported IPs

139.180.213.241 139.180.213.246 118.238.9.41 139.180.213.224
118.239.10.136 118.239.10.241 118.239.12.127 118.239.20.14
118.239.20.78 118.239.24.118 118.239.25.230 139.180.222.168
139.180.222.58 139.180.222.166 139.180.223.134 139.180.223.170
139.180.222.101 139.180.223.11 139.180.222.190 139.180.221.75