Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.20.23.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27201
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.20.23.148.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012401 1800 900 604800 86400

;; Query time: 76 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 04:25:06 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 148.23.20.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.23.20.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
180.182.47.132 attackbots
Jul  9 03:31:52 MK-Soft-VM4 sshd\[20862\]: Invalid user aaa from 180.182.47.132 port 43626
Jul  9 03:31:52 MK-Soft-VM4 sshd\[20862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.182.47.132
Jul  9 03:31:54 MK-Soft-VM4 sshd\[20862\]: Failed password for invalid user aaa from 180.182.47.132 port 43626 ssh2
...
2019-07-09 13:18:15
185.26.220.235 attack
Jul  9 08:23:18 srv-4 sshd\[9546\]: Invalid user benjamin from 185.26.220.235
Jul  9 08:23:18 srv-4 sshd\[9546\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.26.220.235
Jul  9 08:23:20 srv-4 sshd\[9546\]: Failed password for invalid user benjamin from 185.26.220.235 port 35371 ssh2
...
2019-07-09 13:35:55
110.78.179.92 attackbots
Unauthorized connection attempt from IP address 110.78.179.92 on Port 445(SMB)
2019-07-09 13:00:56
101.96.120.7 attackbotsspam
Unauthorized connection attempt from IP address 101.96.120.7 on Port 445(SMB)
2019-07-09 13:04:27
77.52.195.210 attackspambots
Unauthorized connection attempt from IP address 77.52.195.210 on Port 445(SMB)
2019-07-09 13:09:23
58.187.184.213 attackbots
Unauthorized connection attempt from IP address 58.187.184.213 on Port 445(SMB)
2019-07-09 13:26:14
118.70.116.154 attackbotsspam
Unauthorized connection attempt from IP address 118.70.116.154 on Port 445(SMB)
2019-07-09 12:54:05
112.85.42.177 attackbots
$f2bV_matches
2019-07-09 12:48:26
159.69.137.146 attackbotsspam
WordpressAttack
2019-07-09 13:08:22
175.98.115.247 attack
Automatic report - Web App Attack
2019-07-09 12:50:03
113.160.153.11 attackspam
Unauthorized connection attempt from IP address 113.160.153.11 on Port 445(SMB)
2019-07-09 13:44:13
128.106.197.226 attackbots
Unauthorized connection attempt from IP address 128.106.197.226 on Port 445(SMB)
2019-07-09 13:10:30
60.164.170.131 attack
Unauthorized connection attempt from IP address 60.164.170.131 on Port 3389(RDP)
2019-07-09 13:27:22
36.85.57.38 attackspambots
Unauthorized connection attempt from IP address 36.85.57.38 on Port 445(SMB)
2019-07-09 13:42:21
14.250.91.155 attackspambots
Unauthorized connection attempt from IP address 14.250.91.155 on Port 445(SMB)
2019-07-09 13:24:12

Recently Reported IPs

171.78.239.71 106.78.222.61 226.62.26.113 170.214.183.96
236.226.189.29 42.250.226.12 115.242.46.248 141.74.92.85
114.139.115.142 238.217.237.164 124.163.125.66 190.37.198.97
114.231.128.109 187.156.74.164 241.65.135.162 161.116.13.14
255.125.239.208 64.187.176.82 252.81.44.243 171.2.24.120