Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
139.199.34.54 attackbots
May  2 09:56:18 santamaria sshd\[22903\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.34.54  user=root
May  2 09:56:20 santamaria sshd\[22903\]: Failed password for root from 139.199.34.54 port 26637 ssh2
May  2 10:01:24 santamaria sshd\[22997\]: Invalid user vel from 139.199.34.54
May  2 10:01:24 santamaria sshd\[22997\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.34.54
...
2020-05-02 16:24:21
139.199.34.54 attackspam
Apr 30 16:04:41 webhost01 sshd[21041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.34.54
Apr 30 16:04:43 webhost01 sshd[21041]: Failed password for invalid user ratna from 139.199.34.54 port 30154 ssh2
...
2020-04-30 17:33:19
139.199.34.54 attackbotsspam
Apr 27 06:03:20 h2646465 sshd[789]: Invalid user gene from 139.199.34.54
Apr 27 06:03:20 h2646465 sshd[789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.34.54
Apr 27 06:03:20 h2646465 sshd[789]: Invalid user gene from 139.199.34.54
Apr 27 06:03:22 h2646465 sshd[789]: Failed password for invalid user gene from 139.199.34.54 port 64556 ssh2
Apr 27 06:14:52 h2646465 sshd[2284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.34.54  user=root
Apr 27 06:14:54 h2646465 sshd[2284]: Failed password for root from 139.199.34.54 port 45286 ssh2
Apr 27 06:17:48 h2646465 sshd[2869]: Invalid user ubuntu from 139.199.34.54
Apr 27 06:17:48 h2646465 sshd[2869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.34.54
Apr 27 06:17:48 h2646465 sshd[2869]: Invalid user ubuntu from 139.199.34.54
Apr 27 06:17:51 h2646465 sshd[2869]: Failed password for invalid user ubuntu from 139.199.34.
2020-04-27 12:48:11
139.199.34.54 attack
Apr 18 13:25:30 lanister sshd[31799]: Failed password for invalid user ubuntu from 139.199.34.54 port 11170 ssh2
Apr 18 13:42:23 lanister sshd[32150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.34.54  user=postgres
Apr 18 13:42:25 lanister sshd[32150]: Failed password for postgres from 139.199.34.54 port 16947 ssh2
Apr 18 13:49:02 lanister sshd[32260]: Invalid user xv from 139.199.34.54
2020-04-19 02:03:48
139.199.34.54 attack
Apr 16 14:09:38 eventyay sshd[3617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.34.54
Apr 16 14:09:41 eventyay sshd[3617]: Failed password for invalid user demo from 139.199.34.54 port 39839 ssh2
Apr 16 14:12:40 eventyay sshd[3726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.34.54
...
2020-04-16 23:54:12
139.199.34.54 attackspam
leo_www
2020-04-07 13:30:08
139.199.34.54 attackbots
Automatic report - SSH Brute-Force Attack
2020-03-12 03:37:11
139.199.34.54 attackbotsspam
Invalid user cpaneleximfilter from 139.199.34.54 port 11931
2020-03-11 17:17:46
139.199.34.54 attackspambots
SSH bruteforce (Triggered fail2ban)
2020-03-08 20:26:30
139.199.34.54 attack
suspicious action Wed, 26 Feb 2020 15:32:50 -0300
2020-02-27 03:30:23
139.199.34.54 attackspambots
Invalid user ivan from 139.199.34.54 port 38183
2020-02-18 16:33:02
139.199.34.191 attack
[SatNov1615:51:48.0385302019][:error][pid2258:tid140571762964224][client139.199.34.191:24201][client139.199.34.191]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\(\?:\\\\\\\\\(chr\?\\\\\\\\\(\?[0-9]{1\,3}\?\\\\\\\\\)\|\?=\?f\(\?:open\|write\)\?\\\\\\\\\(\|\\\\\\\\b\(\?:passthru\|serialize\|php_uname\|phpinfo\|shell_exec\|preg_\\\\\\\\w \|mysql_query\|exec\|eval\|base64_decode\|decode_base64\|rot13\|base64_url_decode\|gz\(\?:inflate\|decode\|uncompress\)\|strrev\|zlib_\\\\\\\\w \)\\\\\\\\b\?\(\?..."atARGS:admin.[file"/usr/local/apache.ea3/conf/modsec_rules/10_asl_rules.conf"][line"767"][id"340095"][rev"53"][msg"Atomicorp.comWAFRules:AttackBlocked-PHPfunctioninArgument-thismaybeanattack."][data"die\(@md5\,ARGS:admin"][severity"CRITICAL"][hostname"81.17.25.237"][uri"/App.php"][unique_id"XdANBES@OZ7eHP60T7GfSAAAANE"][SatNov1615:52:11.3014982019][:error][pid2171:tid140571855283968][client139.199.34.191:28165][client139.199.34.191]ModSecurity:Accessdeniedwithcode403\(phase2\).Patt
2019-11-16 23:31:16
139.199.34.191 attackspam
ECShop Remote Code Execution Vulnerability, PTR: PTR record not found
2019-09-08 19:53:02
139.199.34.112 attackspambots
Feb 23 03:22:13 motanud sshd\[30052\]: Invalid user andrew from 139.199.34.112 port 33302
Feb 23 03:22:13 motanud sshd\[30052\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.34.112
Feb 23 03:22:15 motanud sshd\[30052\]: Failed password for invalid user andrew from 139.199.34.112 port 33302 ssh2
2019-08-04 14:42:56
139.199.34.112 attackspambots
SSH-BruteForce
2019-07-31 14:25:08
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.199.34.217
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57525
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.199.34.217.			IN	A

;; AUTHORITY SECTION:
.			593	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:21:46 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 217.34.199.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 217.34.199.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
129.204.47.217 attack
Sep  1 19:32:11 legacy sshd[18255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.47.217
Sep  1 19:32:13 legacy sshd[18255]: Failed password for invalid user search from 129.204.47.217 port 50949 ssh2
Sep  1 19:37:52 legacy sshd[18395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.47.217
...
2019-09-02 01:40:18
73.171.226.23 attack
Sep  1 07:52:17 web9 sshd\[4305\]: Invalid user zabbix from 73.171.226.23
Sep  1 07:52:17 web9 sshd\[4305\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.171.226.23
Sep  1 07:52:19 web9 sshd\[4305\]: Failed password for invalid user zabbix from 73.171.226.23 port 48792 ssh2
Sep  1 07:57:05 web9 sshd\[5318\]: Invalid user fax from 73.171.226.23
Sep  1 07:57:05 web9 sshd\[5318\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.171.226.23
2019-09-02 01:59:47
178.254.0.120 attackspam
Forged login request.
2019-09-02 02:00:23
185.24.235.146 attackspambots
Sep  1 13:02:56 vps200512 sshd\[32298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.24.235.146  user=root
Sep  1 13:02:57 vps200512 sshd\[32298\]: Failed password for root from 185.24.235.146 port 59336 ssh2
Sep  1 13:10:40 vps200512 sshd\[32477\]: Invalid user hw from 185.24.235.146
Sep  1 13:10:41 vps200512 sshd\[32477\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.24.235.146
Sep  1 13:10:42 vps200512 sshd\[32477\]: Failed password for invalid user hw from 185.24.235.146 port 48034 ssh2
2019-09-02 01:18:15
212.87.9.141 attackbots
Sep  1 07:33:34 hiderm sshd\[4303\]: Invalid user yx from 212.87.9.141
Sep  1 07:33:34 hiderm sshd\[4303\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.87.9.141
Sep  1 07:33:36 hiderm sshd\[4303\]: Failed password for invalid user yx from 212.87.9.141 port 20734 ssh2
Sep  1 07:37:48 hiderm sshd\[4644\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.87.9.141  user=root
Sep  1 07:37:51 hiderm sshd\[4644\]: Failed password for root from 212.87.9.141 port 65486 ssh2
2019-09-02 01:44:34
84.13.51.192 attackspambots
SSH/22 MH Probe, BF, Hack -
2019-09-02 01:28:02
158.69.192.147 attackspambots
SSH Bruteforce attempt
2019-09-02 01:31:14
190.196.190.242 attackspambots
(Sep  1)  LEN=40 TOS=0x10 PREC=0x40 TTL=53 ID=1958 TCP DPT=8080 WINDOW=21873 SYN 
 (Aug 30)  LEN=40 TOS=0x10 PREC=0x40 TTL=53 ID=20168 TCP DPT=8080 WINDOW=51222 SYN 
 (Aug 29)  LEN=40 TOS=0x10 PREC=0x40 TTL=53 ID=46065 TCP DPT=8080 WINDOW=21873 SYN 
 (Aug 29)  LEN=40 TOS=0x10 PREC=0x40 TTL=53 ID=30667 TCP DPT=8080 WINDOW=65233 SYN 
 (Aug 28)  LEN=40 TOS=0x10 PREC=0x40 TTL=53 ID=61067 TCP DPT=8080 WINDOW=21873 SYN 
 (Aug 28)  LEN=40 TOS=0x10 PREC=0x40 TTL=53 ID=21495 TCP DPT=8080 WINDOW=65233 SYN 
 (Aug 28)  LEN=40 TOS=0x10 PREC=0x40 TTL=53 ID=32790 TCP DPT=8080 WINDOW=65233 SYN 
 (Aug 27)  LEN=40 TOS=0x10 PREC=0x40 TTL=53 ID=43106 TCP DPT=8080 WINDOW=21873 SYN 
 (Aug 27)  LEN=40 TOS=0x10 PREC=0x40 TTL=53 ID=14334 TCP DPT=8080 WINDOW=65233 SYN 
 (Aug 26)  LEN=40 TOS=0x10 PREC=0x40 TTL=53 ID=17531 TCP DPT=8080 WINDOW=51222 SYN 
 (Aug 26)  LEN=40 TOS=0x10 PREC=0x40 TTL=53 ID=54356 TCP DPT=8080 WINDOW=58817 SYN
2019-09-02 01:53:08
206.189.119.73 attack
Sep  1 04:44:11 wbs sshd\[14559\]: Invalid user hiperg from 206.189.119.73
Sep  1 04:44:11 wbs sshd\[14559\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.119.73
Sep  1 04:44:13 wbs sshd\[14559\]: Failed password for invalid user hiperg from 206.189.119.73 port 55910 ssh2
Sep  1 04:48:11 wbs sshd\[14980\]: Invalid user aaron from 206.189.119.73
Sep  1 04:48:11 wbs sshd\[14980\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.119.73
2019-09-02 01:30:36
193.17.52.67 attackbotsspam
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(09011312)
2019-09-02 01:11:54
159.89.194.103 attackspam
Sep  1 19:37:34 MK-Soft-Root2 sshd\[9214\]: Invalid user eclipse from 159.89.194.103 port 58642
Sep  1 19:37:34 MK-Soft-Root2 sshd\[9214\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.194.103
Sep  1 19:37:36 MK-Soft-Root2 sshd\[9214\]: Failed password for invalid user eclipse from 159.89.194.103 port 58642 ssh2
...
2019-09-02 01:53:55
61.94.126.154 attack
Looking for /shopbkp.zip, Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0
2019-09-02 01:29:31
201.191.205.24 attackbots
Sep  1 17:37:47 nopemail dovecot: pop3-login: Aborted login (auth failed, 1 attempts in 0 secs): user=, rip=201.191.205.24, lip=68.183.11.84, session=
...
2019-09-02 01:48:45
203.184.207.144 attackbotsspam
2019-09-01T18:07:32.929254abusebot-8.cloudsearch.cf sshd\[384\]: Invalid user buyer from 203.184.207.144 port 41633
2019-09-02 02:13:06
193.106.29.106 attackspam
Port scan on 8 port(s): 29417 30690 33389 33891 33892 33893 33896 41622
2019-09-02 02:11:49

Recently Reported IPs

139.199.29.216 139.199.33.248 139.199.5.214 139.199.6.137
139.199.59.145 139.199.72.111 118.249.179.73 139.199.62.240
139.199.79.251 139.199.80.135 139.199.85.151 139.199.77.59
139.200.106.31 139.199.94.65 139.199.91.15 118.249.185.154
139.200.13.211 139.200.2.19 139.2.165.233 139.200.21.235