Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Medan

Region: North Sumatra

Country: Indonesia

Internet Service Provider: Esia

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.194.82.31
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19674
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.194.82.31.			IN	A

;; AUTHORITY SECTION:
.			366	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022070200 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 02 17:09:53 CST 2022
;; MSG SIZE  rcvd: 106
Host info
31.82.194.139.in-addr.arpa domain name pointer fm-dyn-139-194-82-31.fast.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
31.82.194.139.in-addr.arpa	name = fm-dyn-139-194-82-31.fast.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
120.92.94.111 attack
php WP PHPmyadamin ABUSE blocked for 12h
2019-06-30 11:44:53
183.190.202.47 attack
22/tcp
[2019-06-29]1pkt
2019-06-30 11:38:27
71.6.142.80 attackbots
2083/tcp 2082/tcp 1900/udp...
[2019-04-29/06-30]49pkt,16pt.(tcp),3pt.(udp)
2019-06-30 11:49:47
189.89.210.42 attack
SASL PLAIN auth failed: ruser=...
2019-06-30 10:59:14
37.49.231.105 attack
Port scan on 1 port(s): 50802
2019-06-30 11:24:54
165.227.210.71 attackspam
Jun 29 20:47:14 lnxweb61 sshd[26908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.210.71
Jun 29 20:47:14 lnxweb61 sshd[26908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.210.71
2019-06-30 11:38:58
143.208.248.76 attackspambots
SMTP Fraud Orders
2019-06-30 11:09:34
122.114.46.120 attackspam
Invalid user www from 122.114.46.120 port 44294
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.46.120
Failed password for invalid user www from 122.114.46.120 port 44294 ssh2
Invalid user oksana from 122.114.46.120 port 44114
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.46.120
2019-06-30 11:05:34
106.12.109.129 attackbotsspam
Invalid user admin from 106.12.109.129 port 46938
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.109.129
Failed password for invalid user admin from 106.12.109.129 port 46938 ssh2
Invalid user ze from 106.12.109.129 port 41538
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.109.129
2019-06-30 11:41:26
37.187.5.137 attackspam
SSH-BruteForce
2019-06-30 11:13:37
5.196.201.99 attack
Port scan: Attack repeated for 24 hours
2019-06-30 11:40:02
45.81.148.171 attackspambots
SpamReport
2019-06-30 11:43:21
46.101.163.220 attackspambots
Jun 30 02:03:13 MK-Soft-VM6 sshd\[15696\]: Invalid user admin from 46.101.163.220 port 59656
Jun 30 02:03:13 MK-Soft-VM6 sshd\[15696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.163.220
Jun 30 02:03:16 MK-Soft-VM6 sshd\[15696\]: Failed password for invalid user admin from 46.101.163.220 port 59656 ssh2
...
2019-06-30 11:28:49
152.136.95.118 attackspambots
Invalid user contas from 152.136.95.118 port 44694
2019-06-30 11:20:30
212.156.115.95 attackbotsspam
Unauthorised access (Jun 29) SRC=212.156.115.95 LEN=40 TTL=239 ID=6748 TCP DPT=445 WINDOW=1024 SYN 
Unauthorised access (Jun 25) SRC=212.156.115.95 LEN=40 TTL=239 ID=5576 TCP DPT=445 WINDOW=1024 SYN
2019-06-30 11:12:21

Recently Reported IPs

154.86.26.21 154.89.5.219 117.199.229.12 151.106.35.199
139.59.88.148 146.70.123.198 114.234.162.97 146.190.29.2
139.177.183.87 139.194.90.149 139.194.88.142 148.66.69.15
142.132.168.232 151.228.48.51 93.126.144.125 116.1.7.59
138.197.168.219 138.255.190.217 143.244.135.164 139.59.237.98