Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
139.194.207.158 attackbotsspam
Sun, 21 Jul 2019 18:28:30 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 04:50:29
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.194.207.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46493
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.194.207.30.			IN	A

;; AUTHORITY SECTION:
.			508	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:16:37 CST 2022
;; MSG SIZE  rcvd: 107
Host info
30.207.194.139.in-addr.arpa domain name pointer fm-dyn-139-194-207-30.fast.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
30.207.194.139.in-addr.arpa	name = fm-dyn-139-194-207-30.fast.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
80.82.77.139 attackbots
23/tcp 8060/tcp 3460/tcp...
[2019-04-28/06-28]1798pkt,269pt.(tcp),48pt.(udp)
2019-06-29 10:35:17
49.79.47.102 attackbots
firewall-block, port(s): 2323/tcp
2019-06-29 10:36:36
177.131.122.212 attack
Jun 29 04:33:01 ArkNodeAT sshd\[23359\]: Invalid user ken from 177.131.122.212
Jun 29 04:33:01 ArkNodeAT sshd\[23359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.131.122.212
Jun 29 04:33:03 ArkNodeAT sshd\[23359\]: Failed password for invalid user ken from 177.131.122.212 port 48049 ssh2
2019-06-29 10:45:42
211.142.19.251 attackspambots
Jun 28 23:40:27 animalibera sshd[19077]: Invalid user test from 211.142.19.251 port 37977
...
2019-06-29 10:50:58
87.110.14.34 attackspam
Unauthorised access (Jun 29) SRC=87.110.14.34 LEN=52 TTL=122 ID=18621 DF TCP DPT=445 WINDOW=8192 SYN
2019-06-29 10:48:01
45.55.210.156 attack
Automatic report - Web App Attack
2019-06-29 10:57:47
202.191.120.48 attackbotsspam
$f2bV_matches
2019-06-29 10:27:27
168.232.131.24 attackbotsspam
Excessive failed login attempts on port 587
2019-06-29 10:41:08
178.33.233.54 attackbotsspam
2019-06-29T01:18:39.8530161240 sshd\[17290\]: Invalid user 10 from 178.33.233.54 port 59779
2019-06-29T01:18:39.8766231240 sshd\[17290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.233.54
2019-06-29T01:18:42.2278611240 sshd\[17290\]: Failed password for invalid user 10 from 178.33.233.54 port 59779 ssh2
...
2019-06-29 11:08:49
191.53.195.41 attackspam
SMTP-sasl brute force
...
2019-06-29 10:57:16
46.101.237.212 attack
Jun 29 02:23:15 XXXXXX sshd[34005]: Invalid user db2inst1 from 46.101.237.212 port 50327
2019-06-29 11:07:31
177.55.149.230 attack
SMTP-sasl brute force
...
2019-06-29 10:54:30
43.242.215.70 attackspam
[ssh] SSH attack
2019-06-29 11:12:45
129.213.97.191 attack
Jun 29 04:31:06 amit sshd\[31394\]: Invalid user user from 129.213.97.191
Jun 29 04:31:06 amit sshd\[31394\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.97.191
Jun 29 04:31:08 amit sshd\[31394\]: Failed password for invalid user user from 129.213.97.191 port 44380 ssh2
...
2019-06-29 10:47:32
119.50.112.229 attackbotsspam
Unauthorised access (Jun 29) SRC=119.50.112.229 LEN=40 TTL=49 ID=19453 TCP DPT=23 WINDOW=63230 SYN
2019-06-29 10:33:25

Recently Reported IPs

139.194.213.73 139.194.207.224 139.194.207.214 139.194.207.39
139.194.206.82 73.173.101.24 139.194.217.97 139.194.221.8
139.194.22.37 139.194.23.219 139.194.218.147 139.194.236.227
139.194.23.76 139.194.232.48 139.194.225.226 139.194.219.6
139.194.235.184 139.194.230.214 139.194.236.243 139.194.237.187