Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.2.154.187
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18911
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.2.154.187.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022602 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 11:42:56 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 187.154.2.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 187.154.2.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
178.62.47.177 attack
Jul 31 14:05:13 SilenceServices sshd[17506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.47.177
Jul 31 14:05:15 SilenceServices sshd[17506]: Failed password for invalid user cvsuser from 178.62.47.177 port 53674 ssh2
Jul 31 14:11:16 SilenceServices sshd[21169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.47.177
2019-07-31 23:26:00
92.118.160.29 attackspambots
Honeypot hit.
2019-08-01 00:03:21
139.99.37.147 attackbots
Jul 31 17:33:39 SilenceServices sshd[4976]: Failed password for root from 139.99.37.147 port 42494 ssh2
Jul 31 17:40:50 SilenceServices sshd[10690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.37.147
Jul 31 17:40:51 SilenceServices sshd[10690]: Failed password for invalid user znc-admin from 139.99.37.147 port 38574 ssh2
2019-08-01 00:04:34
89.248.174.201 attack
31.07.2019 13:41:43 Connection to port 10210 blocked by firewall
2019-08-01 00:27:36
92.118.160.13 attack
Attempts against Pop3/IMAP
2019-08-01 00:10:38
78.188.140.127 attackbots
Unauthorized connection attempt from IP address 78.188.140.127 on Port 445(SMB)
2019-07-31 23:36:52
222.186.52.123 attackspambots
2019-07-24T11:06:45.128Z CLOSE host=222.186.52.123 port=43815 fd=4 time=107.395 bytes=18246
...
2019-07-31 23:41:43
129.28.156.7 attackspambots
Wordpress XMLRPC attack
2019-07-31 23:12:30
213.172.139.222 attack
Automatic report - Port Scan Attack
2019-07-31 23:10:48
122.165.202.243 attackbotsspam
Unauthorized connection attempt from IP address 122.165.202.243 on Port 445(SMB)
2019-08-01 00:13:13
49.79.81.101 attack
Unauthorised access (Jul 31) SRC=49.79.81.101 LEN=44 TTL=50 ID=22349 TCP DPT=8080 WINDOW=13348 SYN
2019-07-31 23:07:21
104.245.253.208 attack
Jul 15 09:43:57 dallas01 sshd[1033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.245.253.208
Jul 15 09:43:59 dallas01 sshd[1033]: Failed password for invalid user admin from 104.245.253.208 port 33040 ssh2
Jul 15 09:44:02 dallas01 sshd[1033]: Failed password for invalid user admin from 104.245.253.208 port 33040 ssh2
Jul 15 09:44:04 dallas01 sshd[1033]: Failed password for invalid user admin from 104.245.253.208 port 33040 ssh2
2019-07-31 23:36:11
104.152.52.28 attackbots
*Port Scan* detected from 104.152.52.28 (US/United States/internettl.org). 11 hits in the last 270 seconds
2019-08-01 00:05:31
112.225.89.58 attackbots
Telnet Server BruteForce Attack
2019-07-31 23:32:58
124.204.36.138 attackspam
Jul 31 14:33:54 yabzik sshd[13090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.204.36.138
Jul 31 14:33:55 yabzik sshd[13090]: Failed password for invalid user partners from 124.204.36.138 port 58899 ssh2
Jul 31 14:38:17 yabzik sshd[14552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.204.36.138
2019-07-31 23:28:11

Recently Reported IPs

54.227.15.202 17.180.111.89 217.126.106.179 44.8.170.27
211.222.139.218 214.249.26.205 204.142.53.118 243.160.51.139
74.181.173.199 96.212.35.94 235.228.215.159 130.93.252.33
223.28.111.172 206.146.98.4 134.135.171.53 123.3.57.185
74.56.154.93 173.34.123.186 149.39.124.41 207.128.8.44