Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.2.129.61
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38412
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.2.129.61.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 13:50:28 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 61.129.2.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 61.129.2.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
123.143.203.67 attackspam
Aug 26 06:46:31 dedicated sshd[23985]: Invalid user nexus from 123.143.203.67 port 33234
2019-08-26 20:53:40
146.185.130.101 attack
$f2bV_matches
2019-08-26 20:26:03
112.186.77.74 attackbots
2019-08-26T11:28:47.576604abusebot.cloudsearch.cf sshd\[8172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.186.77.74  user=root
2019-08-26 20:45:01
49.88.112.90 attack
Aug 26 02:21:57 php2 sshd\[18027\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.90  user=root
Aug 26 02:21:59 php2 sshd\[18027\]: Failed password for root from 49.88.112.90 port 11848 ssh2
Aug 26 02:22:01 php2 sshd\[18027\]: Failed password for root from 49.88.112.90 port 11848 ssh2
Aug 26 02:22:03 php2 sshd\[18027\]: Failed password for root from 49.88.112.90 port 11848 ssh2
Aug 26 02:22:04 php2 sshd\[18403\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.90  user=root
2019-08-26 20:27:44
221.122.93.232 attackbotsspam
Aug 26 05:32:46 eventyay sshd[21114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.122.93.232
Aug 26 05:32:48 eventyay sshd[21114]: Failed password for invalid user guest from 221.122.93.232 port 58858 ssh2
Aug 26 05:37:07 eventyay sshd[21152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.122.93.232
...
2019-08-26 20:28:08
45.61.105.82 attackbotsspam
port scan and connect, tcp 80 (http)
2019-08-26 20:11:12
116.196.118.22 attackspambots
$f2bV_matches
2019-08-26 20:06:53
54.38.188.34 attack
Aug 26 14:36:32 DAAP sshd[28655]: Invalid user beeidigung from 54.38.188.34 port 48524
Aug 26 14:36:32 DAAP sshd[28655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.188.34
Aug 26 14:36:32 DAAP sshd[28655]: Invalid user beeidigung from 54.38.188.34 port 48524
Aug 26 14:36:34 DAAP sshd[28655]: Failed password for invalid user beeidigung from 54.38.188.34 port 48524 ssh2
Aug 26 14:40:34 DAAP sshd[28777]: Invalid user urban from 54.38.188.34 port 37758
...
2019-08-26 20:41:24
117.1.88.219 attackspam
firewall-block, port(s): 23/tcp
2019-08-26 20:22:04
200.199.69.75 attackbotsspam
Aug 26 03:45:42 hcbbdb sshd\[31432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.199.69.75  user=root
Aug 26 03:45:43 hcbbdb sshd\[31432\]: Failed password for root from 200.199.69.75 port 16105 ssh2
Aug 26 03:50:55 hcbbdb sshd\[32049\]: Invalid user louisk from 200.199.69.75
Aug 26 03:50:55 hcbbdb sshd\[32049\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.199.69.75
Aug 26 03:50:57 hcbbdb sshd\[32049\]: Failed password for invalid user louisk from 200.199.69.75 port 62873 ssh2
2019-08-26 20:34:55
172.247.118.4 attackspambots
CloudCIX Reconnaissance Scan Detected, PTR: 172-247-118-4.rdns.cloudradium.com.
2019-08-26 20:30:29
61.144.52.114 attackspam
08/25/2019-23:20:28.556237 61.144.52.114 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-08-26 20:12:49
114.118.91.64 attackspambots
Aug 25 17:34:22 lcdev sshd\[4778\]: Invalid user development from 114.118.91.64
Aug 25 17:34:22 lcdev sshd\[4778\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.118.91.64
Aug 25 17:34:24 lcdev sshd\[4778\]: Failed password for invalid user development from 114.118.91.64 port 58564 ssh2
Aug 25 17:39:23 lcdev sshd\[5340\]: Invalid user sami from 114.118.91.64
Aug 25 17:39:23 lcdev sshd\[5340\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.118.91.64
2019-08-26 20:48:27
42.5.113.40 attackspam
8080/tcp
[2019-08-26]1pkt
2019-08-26 20:36:29
170.81.140.50 attackbotsspam
Sending SPAM email
2019-08-26 20:17:18

Recently Reported IPs

6.104.53.37 63.66.95.89 2.242.184.206 179.234.242.218
78.68.92.235 69.72.6.216 193.247.74.28 44.240.12.74
99.34.115.151 21.114.13.7 56.131.169.149 202.147.191.135
78.79.243.185 141.226.48.17 5.199.250.122 137.133.146.3
129.110.185.128 125.91.184.188 95.21.178.229 233.176.97.130