Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America

Internet Service Provider: Sprious LLC

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
Automatic report - Banned IP Access
2020-08-02 23:04:37
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.180.230.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53634
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.180.230.242.		IN	A

;; AUTHORITY SECTION:
.			293	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020080200 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Aug 02 23:04:27 CST 2020
;; MSG SIZE  rcvd: 119
Host info
242.230.180.139.in-addr.arpa domain name pointer host-139-180-230-242.static.sprious.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.230.180.139.in-addr.arpa	name = host-139-180-230-242.static.sprious.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.142.195.6 attackbotsspam
2020-05-05T04:28:08.183525www postfix/smtpd[20244]: warning: unknown[45.142.195.6]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-05-05T04:29:16.279288www postfix/smtpd[20244]: warning: unknown[45.142.195.6]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-05-05T04:30:26.006706www postfix/smtpd[20244]: warning: unknown[45.142.195.6]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-05-05 10:31:39
122.51.221.184 attack
May  5 04:19:21 vpn01 sshd[15774]: Failed password for root from 122.51.221.184 port 34348 ssh2
May  5 04:29:38 vpn01 sshd[15990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.221.184
...
2020-05-05 10:44:40
49.88.112.76 attackspambots
May  5 10:15:47 webhost01 sshd[9815]: Failed password for root from 49.88.112.76 port 19166 ssh2
...
2020-05-05 11:28:27
51.75.17.122 attackbots
2020-05-05T01:11:17.785415homeassistant sshd[23923]: Invalid user otis from 51.75.17.122 port 54592
2020-05-05T01:11:17.794729homeassistant sshd[23923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.17.122
...
2020-05-05 10:46:04
5.196.38.14 attack
May  4 23:28:00 dns1 sshd[22578]: Failed password for root from 5.196.38.14 port 13864 ssh2
May  4 23:32:05 dns1 sshd[22785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.38.14 
May  4 23:32:07 dns1 sshd[22785]: Failed password for invalid user csgo from 5.196.38.14 port 48299 ssh2
2020-05-05 10:46:54
97.93.250.114 attackbotsspam
Telnetd brute force attack detected by fail2ban
2020-05-05 10:55:25
27.254.174.209 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-05-05 10:44:57
138.68.94.142 attackbots
May  5 03:11:28 h2829583 sshd[2236]: Failed password for root from 138.68.94.142 port 47765 ssh2
2020-05-05 10:37:40
163.172.145.149 attackspambots
May  5 04:40:04 pkdns2 sshd\[17180\]: Invalid user yu from 163.172.145.149May  5 04:40:06 pkdns2 sshd\[17180\]: Failed password for invalid user yu from 163.172.145.149 port 59586 ssh2May  5 04:44:03 pkdns2 sshd\[17452\]: Invalid user aki from 163.172.145.149May  5 04:44:05 pkdns2 sshd\[17452\]: Failed password for invalid user aki from 163.172.145.149 port 42888 ssh2May  5 04:48:05 pkdns2 sshd\[17706\]: Invalid user hines from 163.172.145.149May  5 04:48:07 pkdns2 sshd\[17706\]: Failed password for invalid user hines from 163.172.145.149 port 54438 ssh2
...
2020-05-05 10:35:51
111.59.100.243 attackbots
Observed on multiple hosts.
2020-05-05 10:35:27
170.106.3.225 attackbotsspam
Observed on multiple hosts.
2020-05-05 10:41:26
172.245.180.180 attackspambots
Triggered by Fail2Ban at Ares web server
2020-05-05 11:30:31
142.93.168.126 attack
05/04/2020-21:10:47.895984 142.93.168.126 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-05 11:21:51
23.245.207.186 attackspambots
Automatic report - Banned IP Access
2020-05-05 10:52:38
208.64.33.98 attackspam
May  5 04:14:01 home sshd[20699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.64.33.98
May  5 04:14:04 home sshd[20699]: Failed password for invalid user student from 208.64.33.98 port 39058 ssh2
May  5 04:23:02 home sshd[22001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.64.33.98
...
2020-05-05 10:43:30

Recently Reported IPs

184.219.193.2 97.7.28.223 119.196.247.115 88.249.36.53
202.236.30.58 77.29.129.66 88.156.137.35 176.105.204.223
186.207.107.110 210.108.146.5 58.126.167.25 163.144.154.64
144.151.94.102 129.106.86.246 54.8.107.183 37.235.19.10
168.239.17.23 41.173.121.194 151.148.11.130 63.157.120.161