Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.19.237.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53439
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.19.237.103.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022802 1800 900 604800 86400

;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 06:51:03 CST 2025
;; MSG SIZE  rcvd: 107
Host info
103.237.19.139.in-addr.arpa domain name pointer multiplex-test.mpi-klsb.mpg.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
103.237.19.139.in-addr.arpa	name = multiplex-test.mpi-klsb.mpg.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
35.205.149.203 attackbots
scan z
2019-08-04 18:34:15
134.73.76.168 attackspam
Aug  4 02:39:39 server postfix/smtpd[28274]: NOQUEUE: reject: RCPT from cherry.superacrepair.com[134.73.76.168]: 554 5.7.1 Service unavailable; Client host [134.73.76.168] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=
2019-08-04 18:35:45
92.119.160.52 attack
Sun 04 04:52:49 39698/tcp
Sun 04 05:31:27 54083/tcp
Sun 04 05:36:43 50760/tcp
2019-08-04 18:16:11
193.70.32.148 attack
Aug  4 10:56:30 vibhu-HP-Z238-Microtower-Workstation sshd\[2064\]: Invalid user ozzy from 193.70.32.148
Aug  4 10:56:30 vibhu-HP-Z238-Microtower-Workstation sshd\[2064\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.32.148
Aug  4 10:56:32 vibhu-HP-Z238-Microtower-Workstation sshd\[2064\]: Failed password for invalid user ozzy from 193.70.32.148 port 59170 ssh2
Aug  4 11:00:43 vibhu-HP-Z238-Microtower-Workstation sshd\[2228\]: Invalid user ssl from 193.70.32.148
Aug  4 11:00:43 vibhu-HP-Z238-Microtower-Workstation sshd\[2228\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.32.148
...
2019-08-04 18:20:09
196.20.229.154 attackbots
Aug  4 05:44:59 eventyay sshd[31395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.20.229.154
Aug  4 05:45:02 eventyay sshd[31395]: Failed password for invalid user csgoserver from 196.20.229.154 port 39670 ssh2
Aug  4 05:50:26 eventyay sshd[32614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.20.229.154
...
2019-08-04 17:53:18
178.128.201.224 attack
Aug  4 11:22:57 Ubuntu-1404-trusty-64-minimal sshd\[1350\]: Invalid user nvivek from 178.128.201.224
Aug  4 11:22:57 Ubuntu-1404-trusty-64-minimal sshd\[1350\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.201.224
Aug  4 11:22:59 Ubuntu-1404-trusty-64-minimal sshd\[1350\]: Failed password for invalid user nvivek from 178.128.201.224 port 35566 ssh2
Aug  4 11:35:22 Ubuntu-1404-trusty-64-minimal sshd\[7190\]: Invalid user guest from 178.128.201.224
Aug  4 11:35:22 Ubuntu-1404-trusty-64-minimal sshd\[7190\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.201.224
2019-08-04 18:41:32
144.217.166.65 attackbotsspam
20 attempts against mh-misbehave-ban on ice.magehost.pro
2019-08-04 18:44:32
90.84.242.145 attackspam
Aug  4 03:45:10 pornomens sshd\[18099\]: Invalid user mariadb from 90.84.242.145 port 55634
Aug  4 03:45:10 pornomens sshd\[18099\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.84.242.145
Aug  4 03:45:12 pornomens sshd\[18099\]: Failed password for invalid user mariadb from 90.84.242.145 port 55634 ssh2
...
2019-08-04 18:05:24
58.221.91.74 attackspam
Aug  4 12:47:27 lcl-usvr-01 sshd[15382]: Invalid user deploy from 58.221.91.74
Aug  4 12:47:27 lcl-usvr-01 sshd[15382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.221.91.74 
Aug  4 12:47:27 lcl-usvr-01 sshd[15382]: Invalid user deploy from 58.221.91.74
Aug  4 12:47:30 lcl-usvr-01 sshd[15382]: Failed password for invalid user deploy from 58.221.91.74 port 49380 ssh2
Aug  4 12:52:11 lcl-usvr-01 sshd[16643]: Invalid user cumulus from 58.221.91.74
2019-08-04 18:08:21
62.234.148.33 attack
Aug  4 00:39:26 XXX sshd[33822]: Invalid user student5 from 62.234.148.33 port 45850
2019-08-04 18:42:29
46.101.73.64 attackspam
Aug  4 03:13:04 plusreed sshd[7862]: Invalid user tele from 46.101.73.64
...
2019-08-04 18:09:24
221.237.208.239 attack
email spam
2019-08-04 17:49:41
91.224.60.75 attack
Aug  4 02:41:22 * sshd[28118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.60.75
Aug  4 02:41:23 * sshd[28118]: Failed password for invalid user stefan from 91.224.60.75 port 45126 ssh2
2019-08-04 17:46:48
98.221.220.64 attackspam
Aug  4 04:04:07 work-partkepr sshd\[18557\]: Invalid user alfred from 98.221.220.64 port 47402
Aug  4 04:04:07 work-partkepr sshd\[18557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.221.220.64
...
2019-08-04 18:17:21
218.22.129.38 attackbots
IMAP brute force
...
2019-08-04 17:50:51

Recently Reported IPs

176.4.32.193 248.39.207.244 53.59.78.204 199.214.185.187
247.64.52.211 71.233.215.69 91.169.236.233 218.14.134.44
163.200.38.139 252.50.1.148 38.107.210.64 251.71.165.2
81.133.37.105 100.77.153.153 240.183.76.206 240.107.227.32
234.82.49.101 188.146.233.98 191.139.147.9 42.33.40.100