Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.193.239.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10600
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.193.239.169.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 17:20:29 CST 2025
;; MSG SIZE  rcvd: 108
Host info
169.239.193.139.in-addr.arpa domain name pointer fm-dyn-139-193-239-169.fast.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
169.239.193.139.in-addr.arpa	name = fm-dyn-139-193-239-169.fast.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
3.7.126.213 attackbots
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-06-20 17:48:04
54.37.136.87 attackbots
Jun 20 10:53:11 rotator sshd\[23814\]: Invalid user rick from 54.37.136.87Jun 20 10:53:13 rotator sshd\[23814\]: Failed password for invalid user rick from 54.37.136.87 port 52304 ssh2Jun 20 10:56:28 rotator sshd\[24575\]: Invalid user admin from 54.37.136.87Jun 20 10:56:30 rotator sshd\[24575\]: Failed password for invalid user admin from 54.37.136.87 port 50650 ssh2Jun 20 10:59:45 rotator sshd\[24590\]: Failed password for root from 54.37.136.87 port 48988 ssh2Jun 20 11:02:54 rotator sshd\[25391\]: Invalid user work1 from 54.37.136.87
...
2020-06-20 17:23:10
104.50.3.15 attackspam
Jun 20 12:12:00 lukav-desktop sshd\[32395\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.50.3.15  user=root
Jun 20 12:12:02 lukav-desktop sshd\[32395\]: Failed password for root from 104.50.3.15 port 22218 ssh2
Jun 20 12:15:52 lukav-desktop sshd\[18645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.50.3.15  user=root
Jun 20 12:15:54 lukav-desktop sshd\[18645\]: Failed password for root from 104.50.3.15 port 52499 ssh2
Jun 20 12:19:38 lukav-desktop sshd\[18699\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.50.3.15  user=root
2020-06-20 17:44:34
120.92.155.102 attack
leo_www
2020-06-20 17:17:03
140.143.189.177 attack
2020-06-20T09:40:36.318223galaxy.wi.uni-potsdam.de sshd[15998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.189.177
2020-06-20T09:40:36.312152galaxy.wi.uni-potsdam.de sshd[15998]: Invalid user suporte from 140.143.189.177 port 59876
2020-06-20T09:40:38.368823galaxy.wi.uni-potsdam.de sshd[15998]: Failed password for invalid user suporte from 140.143.189.177 port 59876 ssh2
2020-06-20T09:41:11.722980galaxy.wi.uni-potsdam.de sshd[16068]: Invalid user satheesh from 140.143.189.177 port 36562
2020-06-20T09:41:11.728072galaxy.wi.uni-potsdam.de sshd[16068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.189.177
2020-06-20T09:41:11.722980galaxy.wi.uni-potsdam.de sshd[16068]: Invalid user satheesh from 140.143.189.177 port 36562
2020-06-20T09:41:13.581595galaxy.wi.uni-potsdam.de sshd[16068]: Failed password for invalid user satheesh from 140.143.189.177 port 36562 ssh2
2020-06-20T09:41:50.387872
...
2020-06-20 17:47:45
222.186.15.62 attackbotsspam
Jun 20 11:23:39 minden010 sshd[17954]: Failed password for root from 222.186.15.62 port 38945 ssh2
Jun 20 11:23:42 minden010 sshd[17954]: Failed password for root from 222.186.15.62 port 38945 ssh2
Jun 20 11:23:44 minden010 sshd[17954]: Failed password for root from 222.186.15.62 port 38945 ssh2
...
2020-06-20 17:27:07
190.2.133.216 attackbots
Unauthorized connection attempt detected from IP address 190.2.133.216 to port 22 [T]
2020-06-20 17:41:39
178.62.117.106 attackbots
$f2bV_matches
2020-06-20 17:38:31
46.8.22.23 spamattack
Włamał się na konto Steam
2020-06-20 17:43:21
110.170.180.66 attackspambots
Invalid user arm from 110.170.180.66 port 33947
2020-06-20 17:23:36
124.239.148.63 attackbotsspam
DATE:2020-06-20 10:21:59, IP:124.239.148.63, PORT:ssh SSH brute force auth (docker-dc)
2020-06-20 17:45:02
193.112.156.65 attackspam
Lines containing failures of 193.112.156.65
Jun 18 02:57:47 kmh-wmh-002-nbg03 sshd[17222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.156.65  user=r.r
Jun 18 02:57:50 kmh-wmh-002-nbg03 sshd[17222]: Failed password for r.r from 193.112.156.65 port 32838 ssh2
Jun 18 02:57:53 kmh-wmh-002-nbg03 sshd[17222]: Received disconnect from 193.112.156.65 port 32838:11: Bye Bye [preauth]
Jun 18 02:57:53 kmh-wmh-002-nbg03 sshd[17222]: Disconnected from authenticating user r.r 193.112.156.65 port 32838 [preauth]
Jun 18 03:09:17 kmh-wmh-002-nbg03 sshd[19249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.156.65  user=r.r
Jun 18 03:09:19 kmh-wmh-002-nbg03 sshd[19249]: Failed password for r.r from 193.112.156.65 port 52738 ssh2
Jun 18 03:09:22 kmh-wmh-002-nbg03 sshd[19249]: Received disconnect from 193.112.156.65 port 52738:11: Bye Bye [preauth]
Jun 18 03:09:22 kmh-wmh-002-nbg03 sshd[192........
------------------------------
2020-06-20 17:49:42
91.121.86.22 attack
Jun 20 08:55:13 vps333114 sshd[15155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns319899.ip-91-121-86.eu
Jun 20 08:55:15 vps333114 sshd[15155]: Failed password for invalid user vlado from 91.121.86.22 port 49520 ssh2
...
2020-06-20 17:16:38
157.7.233.185 attack
Jun 20 06:55:51 pbkit sshd[105819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.7.233.185 
Jun 20 06:55:51 pbkit sshd[105819]: Invalid user admin from 157.7.233.185 port 48086
Jun 20 06:55:54 pbkit sshd[105819]: Failed password for invalid user admin from 157.7.233.185 port 48086 ssh2
...
2020-06-20 17:35:48
177.22.91.247 attackbots
Jun 20 10:53:08 pornomens sshd\[8782\]: Invalid user marcus from 177.22.91.247 port 58914
Jun 20 10:53:08 pornomens sshd\[8782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.22.91.247
Jun 20 10:53:10 pornomens sshd\[8782\]: Failed password for invalid user marcus from 177.22.91.247 port 58914 ssh2
...
2020-06-20 17:35:18

Recently Reported IPs

119.54.249.135 140.167.223.160 199.189.101.188 199.27.108.244
228.242.92.109 92.183.166.227 55.240.155.48 252.91.17.247
14.233.42.127 145.216.150.226 123.34.59.53 237.128.195.140
92.129.149.37 125.190.247.156 49.14.133.227 94.112.168.113
199.111.183.154 63.209.200.137 214.45.135.55 25.211.83.4