Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.181.121.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58257
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.181.121.69.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 07:45:54 CST 2025
;; MSG SIZE  rcvd: 107
Host info
b'Host 69.121.181.139.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 139.181.121.69.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
36.7.68.25 attack
Sep 10 07:03:37 root sshd[3159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.7.68.25 
...
2020-09-10 18:07:37
222.239.124.19 attack
Sep  9 21:23:35 php1 sshd\[26772\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.239.124.19  user=root
Sep  9 21:23:37 php1 sshd\[26772\]: Failed password for root from 222.239.124.19 port 37626 ssh2
Sep  9 21:27:35 php1 sshd\[27175\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.239.124.19  user=root
Sep  9 21:27:37 php1 sshd\[27175\]: Failed password for root from 222.239.124.19 port 46800 ssh2
Sep  9 21:31:37 php1 sshd\[27530\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.239.124.19  user=root
2020-09-10 18:34:47
194.26.25.40 attackbotsspam
firewall-block, port(s): 2303/tcp, 4070/tcp, 4470/tcp, 5578/tcp, 6657/tcp, 15354/tcp, 16261/tcp, 18687/tcp, 26566/tcp, 26762/tcp, 33899/tcp, 43132/tcp
2020-09-10 18:37:29
144.34.197.169 attack
...
2020-09-10 18:22:11
112.85.42.102 attack
Sep 10 09:41:20 localhost sshd[117391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.102  user=root
Sep 10 09:41:22 localhost sshd[117391]: Failed password for root from 112.85.42.102 port 13825 ssh2
Sep 10 09:41:24 localhost sshd[117391]: Failed password for root from 112.85.42.102 port 13825 ssh2
Sep 10 09:41:20 localhost sshd[117391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.102  user=root
Sep 10 09:41:22 localhost sshd[117391]: Failed password for root from 112.85.42.102 port 13825 ssh2
Sep 10 09:41:24 localhost sshd[117391]: Failed password for root from 112.85.42.102 port 13825 ssh2
Sep 10 09:41:20 localhost sshd[117391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.102  user=root
Sep 10 09:41:22 localhost sshd[117391]: Failed password for root from 112.85.42.102 port 13825 ssh2
Sep 10 09:41:24 localhost sshd[117391]: F
...
2020-09-10 18:17:58
66.215.83.56 attackbots
Sep  9 18:16:51 plesk sshd[22470]: Invalid user admin from 66.215.83.56
Sep  9 18:16:53 plesk sshd[22470]: Failed password for invalid user admin from 66.215.83.56 port 52864 ssh2
Sep  9 18:16:53 plesk sshd[22470]: Received disconnect from 66.215.83.56: 11: Bye Bye [preauth]
Sep  9 18:16:55 plesk sshd[22472]: Invalid user admin from 66.215.83.56
Sep  9 18:16:57 plesk sshd[22472]: Failed password for invalid user admin from 66.215.83.56 port 52937 ssh2
Sep  9 18:16:57 plesk sshd[22472]: Received disconnect from 66.215.83.56: 11: Bye Bye [preauth]
Sep  9 18:16:59 plesk sshd[22478]: Invalid user admin from 66.215.83.56


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=66.215.83.56
2020-09-10 18:24:43
106.52.55.146 attackspam
2020-09-09T20:49:51.172186yoshi.linuxbox.ninja sshd[3979841]: Failed password for invalid user nx from 106.52.55.146 port 50294 ssh2
2020-09-09T20:53:49.241455yoshi.linuxbox.ninja sshd[3982213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.55.146  user=root
2020-09-09T20:53:50.833003yoshi.linuxbox.ninja sshd[3982213]: Failed password for root from 106.52.55.146 port 36090 ssh2
...
2020-09-10 18:03:19
60.8.123.188 attackbots
Forbidden directory scan :: 2020/09/09 16:47:44 [error] 1010#1010: *1882144 access forbidden by rule, client: 60.8.123.188, server: [censored_2], request: "GET /news/tag/depth:4 HTTP/1.1", host: "www.[censored_2]"
2020-09-10 18:23:36
186.211.99.243 attackbotsspam
Port Scan: TCP/445
2020-09-10 18:30:58
167.248.133.16 attack
 TCP (SYN) 167.248.133.16:26834 -> port 16993, len 44
2020-09-10 18:21:25
192.241.229.62 attackspambots
TCP port : 3128; UDP port : 111
2020-09-10 18:31:54
193.112.96.42 attackspam
Sep 10 01:46:04 game-panel sshd[27928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.96.42
Sep 10 01:46:05 game-panel sshd[27928]: Failed password for invalid user localhost from 193.112.96.42 port 47516 ssh2
Sep 10 01:50:51 game-panel sshd[28204]: Failed password for root from 193.112.96.42 port 44466 ssh2
2020-09-10 18:41:13
175.24.68.241 attack
Sep 10 05:57:43 root sshd[30980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.68.241 
...
2020-09-10 18:03:50
155.93.106.99 attackbotsspam
Lines containing failures of 155.93.106.99
Sep  7 14:07:36 new sshd[10171]: Invalid user vikram from 155.93.106.99 port 60078
Sep  7 14:07:36 new sshd[10171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=155.93.106.99
Sep  7 14:07:39 new sshd[10171]: Failed password for invalid user vikram from 155.93.106.99 port 60078 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=155.93.106.99
2020-09-10 18:23:56
51.178.51.36 attackbotsspam
Sep 10 02:17:27 vps639187 sshd\[8755\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.51.36  user=root
Sep 10 02:17:29 vps639187 sshd\[8755\]: Failed password for root from 51.178.51.36 port 54286 ssh2
Sep 10 02:21:09 vps639187 sshd\[8795\]: Invalid user centos from 51.178.51.36 port 60216
Sep 10 02:21:09 vps639187 sshd\[8795\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.51.36
...
2020-09-10 18:22:28

Recently Reported IPs

75.252.0.137 74.6.65.245 101.145.218.161 51.195.236.40
198.63.141.228 6.103.143.203 72.104.252.218 12.222.208.120
141.43.165.209 17.104.61.190 16.16.36.66 27.9.219.211
157.170.31.196 252.242.141.72 221.53.86.231 152.230.229.90
221.216.23.7 155.8.162.139 57.191.217.55 79.99.216.185