Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: European Union

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.191.197.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43737
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.191.197.134.		IN	A

;; AUTHORITY SECTION:
.			15	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 15:44:47 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 134.197.191.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.197.191.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.12.138.226 attack
May  2 07:13:54 meumeu sshd[17200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.138.226 
May  2 07:13:56 meumeu sshd[17200]: Failed password for invalid user jenkin from 106.12.138.226 port 55938 ssh2
May  2 07:16:10 meumeu sshd[17540]: Failed password for root from 106.12.138.226 port 55940 ssh2
...
2020-05-02 13:36:22
36.75.210.51 attack
Unauthorised access (May  2) SRC=36.75.210.51 LEN=52 TTL=118 ID=30665 DF TCP DPT=445 WINDOW=8192 SYN
2020-05-02 13:28:21
106.54.50.236 attack
Invalid user support from 106.54.50.236 port 54314
2020-05-02 13:25:03
104.168.52.20 attackspam
May  2 06:32:37 srv206 sshd[26178]: Invalid user test5 from 104.168.52.20
May  2 06:32:37 srv206 sshd[26178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.52.20
May  2 06:32:37 srv206 sshd[26178]: Invalid user test5 from 104.168.52.20
May  2 06:32:39 srv206 sshd[26178]: Failed password for invalid user test5 from 104.168.52.20 port 37872 ssh2
...
2020-05-02 13:26:44
195.231.0.89 attackbots
May  2 06:46:43 srv-ubuntu-dev3 sshd[121945]: Invalid user wesley from 195.231.0.89
May  2 06:46:43 srv-ubuntu-dev3 sshd[121945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.231.0.89
May  2 06:46:43 srv-ubuntu-dev3 sshd[121945]: Invalid user wesley from 195.231.0.89
May  2 06:46:44 srv-ubuntu-dev3 sshd[121945]: Failed password for invalid user wesley from 195.231.0.89 port 54510 ssh2
May  2 06:50:25 srv-ubuntu-dev3 sshd[123649]: Invalid user rolands from 195.231.0.89
May  2 06:50:25 srv-ubuntu-dev3 sshd[123649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.231.0.89
May  2 06:50:25 srv-ubuntu-dev3 sshd[123649]: Invalid user rolands from 195.231.0.89
May  2 06:50:27 srv-ubuntu-dev3 sshd[123649]: Failed password for invalid user rolands from 195.231.0.89 port 44934 ssh2
May  2 06:54:10 srv-ubuntu-dev3 sshd[124231]: Invalid user douglas from 195.231.0.89
...
2020-05-02 13:05:30
62.55.243.3 attackbots
Invalid user bj from 62.55.243.3 port 40700
2020-05-02 13:07:34
122.225.200.114 attackspambots
CPHulk brute force detection (a)
2020-05-02 13:38:34
51.255.47.133 attack
Invalid user dhwani from 51.255.47.133 port 34244
2020-05-02 13:26:19
95.165.196.6 attackbots
Port probing on unauthorized port 23
2020-05-02 13:16:38
183.134.66.108 attackspambots
May  2 03:53:13 124388 sshd[23372]: Failed password for root from 183.134.66.108 port 35818 ssh2
May  2 03:57:19 124388 sshd[23495]: Invalid user user from 183.134.66.108 port 59880
May  2 03:57:19 124388 sshd[23495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.134.66.108
May  2 03:57:19 124388 sshd[23495]: Invalid user user from 183.134.66.108 port 59880
May  2 03:57:22 124388 sshd[23495]: Failed password for invalid user user from 183.134.66.108 port 59880 ssh2
2020-05-02 13:09:38
218.92.0.158 attack
fail2ban -- 218.92.0.158
...
2020-05-02 13:28:04
37.187.122.195 attack
(sshd) Failed SSH login from 37.187.122.195 (FR/France/ns332025.ip-37-187-122.eu): 5 in the last 3600 secs
2020-05-02 13:17:07
222.186.173.238 attackspambots
Too many connections or unauthorized access detected from Arctic banned ip
2020-05-02 13:33:45
51.75.16.138 attackbotsspam
Fail2Ban Ban Triggered (2)
2020-05-02 13:31:14
185.143.74.93 attack
2020-05-02T07:23:18.188906www postfix/smtpd[12402]: warning: unknown[185.143.74.93]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-05-02T07:25:17.384734www postfix/smtpd[12402]: warning: unknown[185.143.74.93]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-05-02T07:27:17.027583www postfix/smtpd[12421]: warning: unknown[185.143.74.93]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-05-02 13:40:53

Recently Reported IPs

120.158.126.176 27.128.240.40 68.129.134.165 29.51.52.131
193.96.98.238 158.95.34.224 115.157.192.210 0.30.249.52
236.30.209.90 108.241.225.59 228.70.55.134 246.114.229.248
107.100.18.37 128.241.30.116 26.99.3.162 137.240.18.99
225.58.133.57 205.47.69.213 141.13.184.244 253.46.250.3