Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.193.154.115
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1445
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.193.154.115.		IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 14:36:45 CST 2022
;; MSG SIZE  rcvd: 108
Host info
115.154.193.139.in-addr.arpa domain name pointer fm-dyn-139-193-154-115.fast.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
115.154.193.139.in-addr.arpa	name = fm-dyn-139-193-154-115.fast.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.24.99.26 attackbotsspam
suspicious action Tue, 25 Feb 2020 13:35:04 -0300
2020-02-26 05:37:26
124.235.147.150 attackspambots
1433/tcp...
[2020-02-17/25]7pkt,2pt.(tcp)
2020-02-26 05:33:01
200.59.83.227 attackspam
20/2/25@14:26:58: FAIL: Alarm-Network address from=200.59.83.227
20/2/25@14:26:58: FAIL: Alarm-Network address from=200.59.83.227
...
2020-02-26 05:15:44
59.126.80.127 attack
suspicious action Tue, 25 Feb 2020 13:35:18 -0300
2020-02-26 05:23:21
116.247.81.99 attackbots
Automatic report - SSH Brute-Force Attack
2020-02-26 05:24:04
92.118.160.21 attack
IP: 92.118.160.21
Ports affected
    http protocol over TLS/SSL (443) 
Abuse Confidence rating 100%
Found in DNSBL('s)
ASN Details
   AS36351 SoftLayer Technologies Inc.
   Republic of Lithuania (LT)
   CIDR 92.118.160.0/23
Log Date: 25/02/2020 5:03:02 PM UTC
2020-02-26 05:21:34
139.59.87.250 attackbots
Feb 25 22:00:42 server sshd[1555204]: Failed password for invalid user murakami from 139.59.87.250 port 50772 ssh2
Feb 25 22:11:07 server sshd[1557260]: Failed password for invalid user charles from 139.59.87.250 port 35050 ssh2
Feb 25 22:21:30 server sshd[1559347]: Failed password for invalid user yli from 139.59.87.250 port 47512 ssh2
2020-02-26 05:44:49
189.242.8.173 attack
81/tcp
[2020-02-25]1pkt
2020-02-26 05:15:14
51.91.157.101 attackbots
Feb 25 22:30:06 server sshd[1561311]: Failed password for invalid user sftptest from 51.91.157.101 port 55526 ssh2
Feb 25 22:36:11 server sshd[1562398]: Failed password for invalid user serverpilot from 51.91.157.101 port 45248 ssh2
Feb 25 22:41:59 server sshd[1563467]: Failed password for invalid user siva from 51.91.157.101 port 34968 ssh2
2020-02-26 05:46:35
188.138.158.11 attackbots
Honeypot attack, port: 445, PTR: 188-138-158-11.starnet.md.
2020-02-26 05:20:23
41.66.205.74 attackspambots
20/2/25@11:34:59: FAIL: Alarm-Network address from=41.66.205.74
...
2020-02-26 05:40:04
223.17.34.131 attack
Honeypot attack, port: 5555, PTR: 131-34-17-223-on-nets.com.
2020-02-26 05:23:45
197.50.216.34 attackbotsspam
23/tcp
[2020-02-25]1pkt
2020-02-26 05:13:17
41.78.26.18 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-26 05:11:45
89.218.244.106 attackbotsspam
81/tcp
[2020-02-25]1pkt
2020-02-26 05:22:56

Recently Reported IPs

139.192.77.251 139.193.240.79 139.193.222.205 139.193.214.115
139.193.132.33 139.193.66.14 139.193.249.112 139.193.216.252
139.194.179.198 139.193.217.221 139.194.176.20 139.194.183.8
139.194.172.157 139.194.242.93 139.194.253.154 139.194.65.39
139.194.124.156 139.194.33.129 139.195.160.148 139.195.121.198