Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.193.247.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30483
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.193.247.140.		IN	A

;; AUTHORITY SECTION:
.			503	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 12:38:07 CST 2022
;; MSG SIZE  rcvd: 108
Host info
140.247.193.139.in-addr.arpa domain name pointer fm-dyn-139-193-247-140.fast.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.247.193.139.in-addr.arpa	name = fm-dyn-139-193-247-140.fast.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.71.195.190 attackbotsspam
Unauthorized connection attempt from IP address 45.71.195.190 on Port 445(SMB)
2020-08-16 06:25:49
222.186.169.194 attackbots
Aug 16 00:56:24 jane sshd[6406]: Failed password for root from 222.186.169.194 port 56728 ssh2
Aug 16 00:56:28 jane sshd[6406]: Failed password for root from 222.186.169.194 port 56728 ssh2
...
2020-08-16 06:58:47
182.156.216.51 attackbots
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-15T22:03:29Z and 2020-08-15T22:22:14Z
2020-08-16 06:35:14
50.68.200.101 attackbotsspam
Aug 15 22:42:54 ns382633 sshd\[12858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.68.200.101  user=root
Aug 15 22:42:56 ns382633 sshd\[12858\]: Failed password for root from 50.68.200.101 port 36300 ssh2
Aug 15 22:48:27 ns382633 sshd\[13797\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.68.200.101  user=root
Aug 15 22:48:29 ns382633 sshd\[13797\]: Failed password for root from 50.68.200.101 port 38604 ssh2
Aug 15 22:53:55 ns382633 sshd\[14643\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.68.200.101  user=root
2020-08-16 06:41:24
62.102.148.68 attackspambots
2020-08-15T22:25:44+0000 Failed SSH Authentication/Brute Force Attack. (Server 6)
2020-08-16 06:36:51
218.92.0.221 attackspam
Banned for a week because repeated abuses, for example SSH, but not only
2020-08-16 06:31:05
114.67.110.48 attack
Aug 15 23:08:29 eventyay sshd[24610]: Failed password for root from 114.67.110.48 port 41090 ssh2
Aug 15 23:09:42 eventyay sshd[24637]: Failed password for root from 114.67.110.48 port 57862 ssh2
...
2020-08-16 07:01:22
188.71.236.105 attackbots
Unauthorized connection attempt from IP address 188.71.236.105 on Port 445(SMB)
2020-08-16 06:44:12
222.186.30.167 attack
2020-08-16T00:47:47.906180vps751288.ovh.net sshd\[16990\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.167  user=root
2020-08-16T00:47:49.769087vps751288.ovh.net sshd\[16990\]: Failed password for root from 222.186.30.167 port 57812 ssh2
2020-08-16T00:47:51.802003vps751288.ovh.net sshd\[16990\]: Failed password for root from 222.186.30.167 port 57812 ssh2
2020-08-16T00:47:53.585368vps751288.ovh.net sshd\[16990\]: Failed password for root from 222.186.30.167 port 57812 ssh2
2020-08-16T00:47:55.839023vps751288.ovh.net sshd\[16992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.167  user=root
2020-08-16 06:49:17
75.57.13.94 attack
rain
2020-08-16 06:47:14
23.225.168.10 attackspambots
[Sat Aug 15 14:10:25 2020] - Syn Flood From IP: 23.225.168.10 Port: 6000
2020-08-16 06:28:40
222.186.180.147 attackspambots
Aug 15 22:08:49 game-panel sshd[29922]: Failed password for root from 222.186.180.147 port 44974 ssh2
Aug 15 22:08:52 game-panel sshd[29922]: Failed password for root from 222.186.180.147 port 44974 ssh2
Aug 15 22:08:56 game-panel sshd[29922]: Failed password for root from 222.186.180.147 port 44974 ssh2
Aug 15 22:08:59 game-panel sshd[29922]: Failed password for root from 222.186.180.147 port 44974 ssh2
2020-08-16 06:33:37
94.102.56.238 attack
srv02 Mass scanning activity detected Target: 5900  ..
2020-08-16 06:59:26
49.235.153.179 attack
Aug 15 16:44:57 mail sshd\[35465\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.153.179  user=root
...
2020-08-16 06:56:35
138.68.67.96 attackspambots
Aug 15 23:16:44 inter-technics sshd[3511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.67.96  user=root
Aug 15 23:16:46 inter-technics sshd[3511]: Failed password for root from 138.68.67.96 port 55106 ssh2
Aug 15 23:20:12 inter-technics sshd[3722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.67.96  user=root
Aug 15 23:20:14 inter-technics sshd[3722]: Failed password for root from 138.68.67.96 port 36600 ssh2
Aug 15 23:23:45 inter-technics sshd[3876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.67.96  user=root
Aug 15 23:23:46 inter-technics sshd[3876]: Failed password for root from 138.68.67.96 port 46324 ssh2
...
2020-08-16 06:35:44

Recently Reported IPs

139.193.211.71 139.194.121.240 139.194.109.38 139.194.121.33
139.193.223.94 139.194.1.187 139.194.145.93 139.193.208.186
139.194.182.214 139.194.148.178 139.194.206.179 139.194.242.40
139.194.242.9 139.194.60.131 139.194.60.84 139.194.91.118
139.194.245.10 139.194.98.180 139.194.247.77 139.195.194.226