Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
139.180.221.152 attackspam
139.180.221.152 - - \[16/Nov/2019:06:29:22 +0000\] "POST /wp/wp-login.php HTTP/1.1" 200 4205 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
139.180.221.152 - - \[16/Nov/2019:06:29:23 +0000\] "POST /wp/xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-11-16 15:09:57
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.180.221.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64316
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.180.221.49.			IN	A

;; AUTHORITY SECTION:
.			240	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 05:37:19 CST 2022
;; MSG SIZE  rcvd: 107
Host info
49.221.180.139.in-addr.arpa domain name pointer 139.180.221.49.vultr.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
49.221.180.139.in-addr.arpa	name = 139.180.221.49.vultr.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
60.189.236.115 attackbotsspam
Unauthorized connection attempt from IP address 60.189.236.115 on Port 445(SMB)
2019-07-13 10:02:15
177.44.161.182 attack
Unauthorized connection attempt from IP address 177.44.161.182 on Port 445(SMB)
2019-07-13 09:38:37
148.255.212.215 attackbots
Unauthorized connection attempt from IP address 148.255.212.215 on Port 445(SMB)
2019-07-13 09:59:13
85.120.166.136 attack
fail2ban honeypot
2019-07-13 10:07:57
117.161.31.213 attackbots
Jul 13 03:12:21 mail sshd\[2452\]: Invalid user tp from 117.161.31.213 port 55250
Jul 13 03:12:21 mail sshd\[2452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.161.31.213
Jul 13 03:12:23 mail sshd\[2452\]: Failed password for invalid user tp from 117.161.31.213 port 55250 ssh2
Jul 13 03:16:20 mail sshd\[3142\]: Invalid user boyan from 117.161.31.213 port 60778
Jul 13 03:16:20 mail sshd\[3142\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.161.31.213
2019-07-13 09:31:40
180.76.115.251 attack
2019-07-12T22:00:08.288858stark.klein-stark.info sshd\[25521\]: Invalid user ts3server from 180.76.115.251 port 41136
2019-07-12T22:00:08.294519stark.klein-stark.info sshd\[25521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.115.251
2019-07-12T22:00:10.484999stark.klein-stark.info sshd\[25521\]: Failed password for invalid user ts3server from 180.76.115.251 port 41136 ssh2
...
2019-07-13 09:52:58
129.146.65.47 attack
NAME : OPC1 CIDR : 129.144.0.0/12 SYN Flood DDoS Attack USA - California - block certain countries :) IP: 129.146.65.47  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-07-13 09:44:35
91.185.212.110 attackspambots
masters-of-media.de 91.185.212.110 \[13/Jul/2019:02:09:15 +0200\] "POST /wp-login.php HTTP/1.1" 200 5855 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
masters-of-media.de 91.185.212.110 \[13/Jul/2019:02:09:16 +0200\] "POST /wp-login.php HTTP/1.1" 200 5810 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
masters-of-media.de 91.185.212.110 \[13/Jul/2019:02:09:16 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4102 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-07-13 10:07:11
138.68.27.253 attack
VNC brute force attack detected by fail2ban
2019-07-13 09:55:41
149.129.244.23 attack
Invalid user ddd from 149.129.244.23 port 37606
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.129.244.23
Failed password for invalid user ddd from 149.129.244.23 port 37606 ssh2
Invalid user upload from 149.129.244.23 port 39908
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.129.244.23
2019-07-13 09:49:29
131.108.216.73 attack
failed_logins
2019-07-13 09:48:07
82.114.241.138 attack
WordPress brute force
2019-07-13 10:09:56
94.127.188.209 attack
Automatic report - Web App Attack
2019-07-13 10:05:20
190.108.45.245 attackspam
Jul 12 16:01:44 web1 postfix/smtpd[8423]: warning: unknown[190.108.45.245]: SASL PLAIN authentication failed: authentication failure
...
2019-07-13 09:42:47
172.108.154.2 attackspambots
12.07.2019 20:16:43 SSH access blocked by firewall
2019-07-13 09:36:29

Recently Reported IPs

139.180.222.199 139.180.221.218 139.180.221.102 139.180.223.90
139.180.222.79 139.180.223.231 139.185.46.80 139.186.136.7
139.189.177.96 139.186.168.74 139.186.181.140 139.186.200.10
139.186.203.118 139.186.169.127 139.186.64.203 139.189.216.198
139.189.219.213 139.189.248.126 139.19.217.8 139.190.147.21