Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Jakarta

Region: Jakarta

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
139.194.115.234 attackspam
Unauthorized connection attempt from IP address 139.194.115.234 on Port 445(SMB)
2020-08-14 19:29:57
139.194.115.234 attackspambots
Unauthorized connection attempt from IP address 139.194.115.234 on Port 445(SMB)
2019-11-29 03:17:28
139.194.115.234 attack
Unauthorized connection attempt from IP address 139.194.115.234 on Port 445(SMB)
2019-11-17 05:35:38
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.194.11.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60633
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.194.11.168.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082200 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Aug 22 19:58:47 CST 2019
;; MSG SIZE  rcvd: 118
Host info
168.11.194.139.in-addr.arpa domain name pointer fm-dyn-139-194-11-168.fast.net.id.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
168.11.194.139.in-addr.arpa	name = fm-dyn-139-194-11-168.fast.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.245.145.8 attack
(From abney.devon@hotmail.com) Do you want to post your ad on 1000's of Advertising sites every month? One tiny investment every month will get you virtually unlimited traffic to your site forever!Get more info by visiting: http://lotsofadsposted4u.myvnc.com
2019-08-09 21:02:11
184.168.152.78 attack
xmlrpc attack
2019-08-09 20:46:06
159.65.135.11 attack
Aug  9 08:44:01 ny01 sshd[6080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.135.11
Aug  9 08:44:03 ny01 sshd[6080]: Failed password for invalid user station from 159.65.135.11 port 38730 ssh2
Aug  9 08:49:52 ny01 sshd[6519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.135.11
2019-08-09 20:53:28
111.121.27.91 attackbotsspam
FTP/21 MH Probe, BF, Hack -
2019-08-09 21:18:59
2607:fb50:2400:0:225:90ff:fe3c:6260 attack
xmlrpc attack
2019-08-09 20:49:58
106.89.243.17 attack
FTP/21 MH Probe, BF, Hack -
2019-08-09 21:22:10
153.36.242.143 attackbotsspam
$f2bV_matches
2019-08-09 21:16:20
212.224.126.76 attack
Aug  9 07:59:37 MK-Soft-VM5 sshd\[12928\]: Invalid user redis from 212.224.126.76 port 50622
Aug  9 07:59:37 MK-Soft-VM5 sshd\[12928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.224.126.76
Aug  9 07:59:39 MK-Soft-VM5 sshd\[12928\]: Failed password for invalid user redis from 212.224.126.76 port 50622 ssh2
...
2019-08-09 21:03:29
122.169.111.199 attackspam
xmlrpc attack
2019-08-09 20:53:02
41.77.129.202 attack
Aug  9 10:57:19 pornomens sshd\[7103\]: Invalid user pete from 41.77.129.202 port 53927
Aug  9 10:57:19 pornomens sshd\[7103\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.77.129.202
Aug  9 10:57:21 pornomens sshd\[7103\]: Failed password for invalid user pete from 41.77.129.202 port 53927 ssh2
...
2019-08-09 21:32:27
49.207.180.197 attack
Aug  9 14:58:44 ubuntu-2gb-nbg1-dc3-1 sshd[30013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.207.180.197
Aug  9 14:58:46 ubuntu-2gb-nbg1-dc3-1 sshd[30013]: Failed password for invalid user domain from 49.207.180.197 port 50570 ssh2
...
2019-08-09 21:22:36
52.15.134.14 attackspambots
Automatic report - SSH Brute-Force Attack
2019-08-09 21:00:55
121.138.213.2 attack
Aug  9 14:12:33 * sshd[31132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.138.213.2
Aug  9 14:12:36 * sshd[31132]: Failed password for invalid user otto from 121.138.213.2 port 29889 ssh2
2019-08-09 20:47:32
35.184.103.114 attack
SQL Injection attempts
2019-08-09 20:57:23
117.4.106.176 attack
Unauthorised access (Aug  9) SRC=117.4.106.176 LEN=52 TTL=43 ID=32466 DF TCP DPT=445 WINDOW=8192 SYN
2019-08-09 20:44:09

Recently Reported IPs

35.200.69.215 8.65.188.236 158.157.124.8 71.226.169.124
134.209.204.108 82.250.163.217 68.183.15.91 96.56.219.34
149.129.226.67 187.120.138.3 177.23.76.75 103.24.201.9
117.223.189.83 14.42.14.14 135.188.106.9 13.92.57.170
135.167.22.183 127.46.184.57 136.13.84.42 28.248.185.219