Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Singapore

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
139.180.213.55 attackspam
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-09-28T05:16:24Z and 2020-09-28T07:04:47Z
2020-09-29 02:34:28
139.180.213.55 attack
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-09-28T05:16:24Z and 2020-09-28T07:04:47Z
2020-09-28 18:41:40
139.180.213.55 attackspambots
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-08-12T20:54:26Z and 2020-08-12T21:01:43Z
2020-08-13 07:33:30
139.180.213.55 attackbots
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-08-12T12:21:22Z and 2020-08-12T12:42:19Z
2020-08-12 22:27:44
139.180.213.55 attack
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-07-31T20:06:02Z and 2020-07-31T20:32:53Z
2020-08-01 05:47:52
139.180.213.55 attackspam
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-07-25T07:32:47Z and 2020-07-25T07:54:00Z
2020-07-25 16:02:27
139.180.213.55 attack
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-07-20T19:27:14Z and 2020-07-20T20:41:48Z
2020-07-21 07:32:56
139.180.213.200 attackbotsspam
Looking for resource vulnerabilities
2019-08-02 11:56:45
139.180.213.200 attack
Looking for resource vulnerabilities
2019-06-23 20:37:28
139.180.213.200 attack
NAME : CHOOPALLC-AP CIDR : 139.180.192.0/19 | STATUS : 200 ROBOT {Looking for resource vulnerabilities} DDoS Attack United States - block certain countries :) IP: 139.180.213.200  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-06-22 18:45:22
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.180.213.246
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3539
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.180.213.246.		IN	A

;; AUTHORITY SECTION:
.			479	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:14:13 CST 2022
;; MSG SIZE  rcvd: 108
Host info
246.213.180.139.in-addr.arpa domain name pointer 139.180.213.246.vultr.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
246.213.180.139.in-addr.arpa	name = 139.180.213.246.vultr.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.234.99.246 attackspambots
Bruteforce detected by fail2ban
2020-08-18 23:08:33
49.234.16.16 attackbotsspam
2020-08-18T14:26:37.268006mail.broermann.family sshd[23043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.16.16
2020-08-18T14:26:37.263783mail.broermann.family sshd[23043]: Invalid user www from 49.234.16.16 port 36754
2020-08-18T14:26:39.254274mail.broermann.family sshd[23043]: Failed password for invalid user www from 49.234.16.16 port 36754 ssh2
2020-08-18T14:33:29.922712mail.broermann.family sshd[23304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.16.16  user=root
2020-08-18T14:33:31.467470mail.broermann.family sshd[23304]: Failed password for root from 49.234.16.16 port 47170 ssh2
...
2020-08-18 23:02:19
130.162.71.237 attackspam
Aug 18 16:40:33 PorscheCustomer sshd[25877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.162.71.237
Aug 18 16:40:36 PorscheCustomer sshd[25877]: Failed password for invalid user trixie from 130.162.71.237 port 14653 ssh2
Aug 18 16:44:57 PorscheCustomer sshd[26036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.162.71.237
...
2020-08-18 22:47:54
202.155.228.207 attackspam
2020-08-18T14:27:09.961914v22018076590370373 sshd[16724]: Invalid user deploy from 202.155.228.207 port 46164
2020-08-18T14:27:09.967986v22018076590370373 sshd[16724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.155.228.207
2020-08-18T14:27:09.961914v22018076590370373 sshd[16724]: Invalid user deploy from 202.155.228.207 port 46164
2020-08-18T14:27:12.014610v22018076590370373 sshd[16724]: Failed password for invalid user deploy from 202.155.228.207 port 46164 ssh2
2020-08-18T14:33:39.818432v22018076590370373 sshd[32726]: Invalid user gpadmin from 202.155.228.207 port 34424
...
2020-08-18 22:56:43
129.213.148.12 attackbots
Automatic report BANNED IP
2020-08-18 23:09:15
84.205.97.114 attackbots
SSH login attempts.
2020-08-18 22:49:11
208.113.164.202 attack
2020-08-18T17:27:19.230053afi-git.jinr.ru sshd[32057]: Invalid user awx from 208.113.164.202 port 42942
2020-08-18T17:27:19.233409afi-git.jinr.ru sshd[32057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=pornopyro.com
2020-08-18T17:27:19.230053afi-git.jinr.ru sshd[32057]: Invalid user awx from 208.113.164.202 port 42942
2020-08-18T17:27:21.088223afi-git.jinr.ru sshd[32057]: Failed password for invalid user awx from 208.113.164.202 port 42942 ssh2
2020-08-18T17:30:50.175454afi-git.jinr.ru sshd[493]: Invalid user jrodriguez from 208.113.164.202 port 42702
...
2020-08-18 23:10:53
51.68.123.198 attackspam
Auto Fail2Ban report, multiple SSH login attempts.
2020-08-18 23:01:20
111.231.33.135 attackspambots
SSH brute-force attempt
2020-08-18 22:38:55
37.98.196.186 attackbots
Auto Fail2Ban report, multiple SSH login attempts.
2020-08-18 23:04:11
165.22.220.253 attackbots
165.22.220.253 - - [18/Aug/2020:14:34:05 +0200] "GET /wp-login.php HTTP/1.1" 200 8691 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.22.220.253 - - [18/Aug/2020:14:34:07 +0200] "POST /wp-login.php HTTP/1.1" 200 8921 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.22.220.253 - - [18/Aug/2020:14:34:08 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-18 22:26:37
157.245.37.160 attackspam
Aug 18 14:35:17 onepixel sshd[4075351]: Failed password for root from 157.245.37.160 port 48954 ssh2
Aug 18 14:39:07 onepixel sshd[4077619]: Invalid user hlds from 157.245.37.160 port 56658
Aug 18 14:39:07 onepixel sshd[4077619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.37.160 
Aug 18 14:39:07 onepixel sshd[4077619]: Invalid user hlds from 157.245.37.160 port 56658
Aug 18 14:39:09 onepixel sshd[4077619]: Failed password for invalid user hlds from 157.245.37.160 port 56658 ssh2
2020-08-18 23:09:56
88.69.36.161 attackbotsspam
Aug 18 14:17:26 v26 sshd[14557]: Invalid user venom from 88.69.36.161 port 48325
Aug 18 14:17:26 v26 sshd[14557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.69.36.161
Aug 18 14:17:28 v26 sshd[14557]: Failed password for invalid user venom from 88.69.36.161 port 48325 ssh2
Aug 18 14:17:29 v26 sshd[14557]: Received disconnect from 88.69.36.161 port 48325:11: Bye Bye [preauth]
Aug 18 14:17:29 v26 sshd[14557]: Disconnected from 88.69.36.161 port 48325 [preauth]
Aug 18 14:24:37 v26 sshd[15554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.69.36.161  user=r.r
Aug 18 14:24:39 v26 sshd[15554]: Failed password for r.r from 88.69.36.161 port 42161 ssh2
Aug 18 14:24:39 v26 sshd[15554]: Received disconnect from 88.69.36.161 port 42161:11: Bye Bye [preauth]
Aug 18 14:24:39 v26 sshd[15554]: Disconnected from 88.69.36.161 port 42161 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/vie
2020-08-18 22:42:25
49.35.84.174 attackbotsspam
1597754043 - 08/18/2020 14:34:03 Host: 49.35.84.174/49.35.84.174 Port: 445 TCP Blocked
2020-08-18 22:35:00
37.255.233.80 attackbotsspam
IP attempted unauthorised action
2020-08-18 23:05:05

Recently Reported IPs

139.180.213.233 118.238.9.41 139.180.213.224 118.239.10.136
118.239.10.241 118.239.12.127 118.239.20.14 118.239.20.78
118.239.24.118 118.239.25.230 139.180.222.168 139.180.222.58
139.180.222.166 139.180.223.134 139.180.223.170 139.180.222.101
139.180.223.11 139.180.222.190 139.180.221.75 139.180.222.154