Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.193.5.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27990
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.193.5.21.			IN	A

;; AUTHORITY SECTION:
.			249	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:16:11 CST 2022
;; MSG SIZE  rcvd: 105
Host info
21.5.193.139.in-addr.arpa domain name pointer fm-dyn-139-193-5-21.fast.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.5.193.139.in-addr.arpa	name = fm-dyn-139-193-5-21.fast.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
119.45.137.210 attackspambots
Aug  4 17:01:01  sshd\[25046\]: User root from 119.45.137.210 not allowed because not listed in AllowUsersAug  4 17:01:04  sshd\[25046\]: Failed password for invalid user root from 119.45.137.210 port 49684 ssh2
...
2020-08-04 23:25:23
118.113.84.108 attack
08/04/2020-05:22:12.217880 118.113.84.108 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-08-04 23:09:27
61.138.230.106 attackbotsspam
Aug  4 12:07:45 minden010 sshd[32318]: Failed password for root from 61.138.230.106 port 47481 ssh2
Aug  4 12:11:36 minden010 sshd[316]: Failed password for root from 61.138.230.106 port 11420 ssh2
...
2020-08-04 22:59:41
23.95.97.171 attackbotsspam
(From eric@talkwithwebvisitor.com) Hello, my name’s Eric and I just ran across your website at truthchiropractic.com...

I found it after a quick search, so your SEO’s working out…

Content looks pretty good…

One thing’s missing though…

A QUICK, EASY way to connect with you NOW.

Because studies show that a web lead like me will only hang out a few seconds – 7 out of 10 disappear almost instantly, Surf Surf Surf… then gone forever.

I have the solution:

Talk With Web Visitor is a software widget that’s works on your site, ready to capture any visitor’s Name, Email address and Phone Number.  You’ll know immediately they’re interested and you can call them directly to TALK with them - literally while they’re still on the web looking at your site.

CLICK HERE http://www.talkwithwebvisitors.com to try out a Live Demo with Talk With Web Visitor now to see exactly how it works and even give it a try… it could be huge for your business.

Plus, now that you’ve got that phone number, with our new
2020-08-04 23:05:59
180.249.41.85 attackspam
Automatic report - Port Scan Attack
2020-08-04 22:51:19
207.154.215.119 attackbots
Aug  4 14:06:35 vps639187 sshd\[19462\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.215.119  user=root
Aug  4 14:06:38 vps639187 sshd\[19462\]: Failed password for root from 207.154.215.119 port 52030 ssh2
Aug  4 14:11:40 vps639187 sshd\[19632\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.215.119  user=root
...
2020-08-04 23:25:03
85.232.252.94 attack
Aug  4 00:16:21 php1 sshd\[28096\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.232.252.94  user=root
Aug  4 00:16:23 php1 sshd\[28096\]: Failed password for root from 85.232.252.94 port 37138 ssh2
Aug  4 00:17:58 php1 sshd\[28207\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.232.252.94  user=root
Aug  4 00:18:00 php1 sshd\[28207\]: Failed password for root from 85.232.252.94 port 18271 ssh2
Aug  4 00:19:28 php1 sshd\[28308\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.232.252.94  user=root
2020-08-04 23:24:16
106.12.123.239 attackspambots
SSH auth scanning - multiple failed logins
2020-08-04 23:01:02
151.225.48.238 attackspam
 TCP (SYN) 151.225.48.238:36246 -> port 23, len 44
2020-08-04 23:20:17
85.249.2.10 attack
Aug  4 16:46:02 OPSO sshd\[24841\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.249.2.10  user=root
Aug  4 16:46:04 OPSO sshd\[24841\]: Failed password for root from 85.249.2.10 port 49048 ssh2
Aug  4 16:50:30 OPSO sshd\[25931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.249.2.10  user=root
Aug  4 16:50:32 OPSO sshd\[25931\]: Failed password for root from 85.249.2.10 port 54861 ssh2
Aug  4 16:54:53 OPSO sshd\[26684\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.249.2.10  user=root
2020-08-04 23:19:38
106.54.114.248 attack
detected by Fail2Ban
2020-08-04 23:13:35
23.81.230.136 attack
(From eric@talkwithwebvisitor.com) Hello, my name’s Eric and I just ran across your website at truthchiropractic.com...

I found it after a quick search, so your SEO’s working out…

Content looks pretty good…

One thing’s missing though…

A QUICK, EASY way to connect with you NOW.

Because studies show that a web lead like me will only hang out a few seconds – 7 out of 10 disappear almost instantly, Surf Surf Surf… then gone forever.

I have the solution:

Talk With Web Visitor is a software widget that’s works on your site, ready to capture any visitor’s Name, Email address and Phone Number.  You’ll know immediately they’re interested and you can call them directly to TALK with them - literally while they’re still on the web looking at your site.

CLICK HERE http://www.talkwithwebvisitors.com to try out a Live Demo with Talk With Web Visitor now to see exactly how it works and even give it a try… it could be huge for your business.

Plus, now that you’ve got that phone number, with our new
2020-08-04 23:12:21
178.134.87.204 attackbots
1596532943 - 08/04/2020 11:22:23 Host: 178.134.87.204/178.134.87.204 Port: 445 TCP Blocked
2020-08-04 22:57:57
101.6.133.27 attack
Aug  4 13:28:19 OPSO sshd\[18223\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.6.133.27  user=root
Aug  4 13:28:21 OPSO sshd\[18223\]: Failed password for root from 101.6.133.27 port 47334 ssh2
Aug  4 13:32:13 OPSO sshd\[19230\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.6.133.27  user=root
Aug  4 13:32:15 OPSO sshd\[19230\]: Failed password for root from 101.6.133.27 port 46959 ssh2
Aug  4 13:36:04 OPSO sshd\[20086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.6.133.27  user=root
2020-08-04 22:57:08
210.56.23.100 attackspambots
Aug  4 12:33:55 vps647732 sshd[12654]: Failed password for root from 210.56.23.100 port 35706 ssh2
...
2020-08-04 23:20:45

Recently Reported IPs

139.193.48.156 139.193.48.174 139.193.48.122 139.193.5.99
139.193.51.56 139.193.49.179 139.193.53.2 139.193.54.167
118.24.142.229 118.24.143.35 118.24.144.15 118.24.145.90
118.24.146.111 118.24.147.160 139.194.207.190 139.194.206.94
139.194.207.185 139.194.207.206 139.194.207.117 139.194.207.133