Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.193.137.210
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47274
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.193.137.210.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024120900 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 10 00:20:26 CST 2024
;; MSG SIZE  rcvd: 108
Host info
210.137.193.139.in-addr.arpa domain name pointer fm-dyn-139-193-137-210.fast.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
210.137.193.139.in-addr.arpa	name = fm-dyn-139-193-137-210.fast.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
180.246.38.114 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 07-04-2020 13:50:08.
2020-04-07 22:48:30
223.16.160.141 attackbots
Honeypot attack, port: 5555, PTR: 141-160-16-223-on-nets.com.
2020-04-07 22:29:19
158.69.228.225 attackbots
Fraud orders on our website
2020-04-07 22:40:56
62.253.152.23 attackspam
Unauthorized connection attempt detected from IP address 62.253.152.23 to port 3389
2020-04-07 22:21:41
52.252.99.246 attackspam
AUTH=EFAIL:TYPE=LOGIN
2020-04-07 22:23:32
146.185.25.166 attackbots
firewall-block, port(s): 11443/tcp
2020-04-07 22:35:03
201.197.203.96 attackbots
Unauthorized connection attempt detected from IP address 201.197.203.96 to port 80
2020-04-07 22:14:24
180.97.250.66 attack
firewall-block, port(s): 60001/tcp
2020-04-07 22:27:09
51.15.56.133 attack
Apr  7 16:26:37 vmd17057 sshd[8453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.56.133 
Apr  7 16:26:39 vmd17057 sshd[8453]: Failed password for invalid user ubuntu from 51.15.56.133 port 44588 ssh2
...
2020-04-07 22:36:37
192.241.211.150 attack
firewall-block, port(s): 5431/tcp
2020-04-07 22:17:56
14.29.204.213 attackbotsspam
Apr  7 09:42:29 ny01 sshd[7470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.204.213
Apr  7 09:42:31 ny01 sshd[7470]: Failed password for invalid user web from 14.29.204.213 port 39833 ssh2
Apr  7 09:46:53 ny01 sshd[8291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.204.213
2020-04-07 22:05:29
187.49.211.123 attackspambots
20/4/7@08:50:29: FAIL: Alarm-Network address from=187.49.211.123
...
2020-04-07 22:14:45
186.214.191.81 attackspam
firewall-block, port(s): 445/tcp
2020-04-07 22:22:42
183.82.121.34 attackspam
Apr  7 13:59:07 game-panel sshd[7416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.121.34
Apr  7 13:59:08 game-panel sshd[7416]: Failed password for invalid user deploy from 183.82.121.34 port 55418 ssh2
Apr  7 14:03:19 game-panel sshd[7638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.121.34
2020-04-07 22:12:29
202.155.47.140 attackbotsspam
report
2020-04-07 22:19:57

Recently Reported IPs

32.166.146.228 242.27.81.172 21.253.145.243 115.4.74.231
234.111.173.5 125.90.1.55 227.20.145.127 195.19.76.225
54.118.239.160 116.36.85.177 210.114.172.114 203.159.247.127
194.185.51.44 45.74.139.64 118.192.191.199 87.15.238.142
171.63.212.133 35.206.150.255 195.23.134.125 106.253.68.49