Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.224.130.86
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34038
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.224.130.86.			IN	A

;; AUTHORITY SECTION:
.			367	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:24:18 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 86.130.224.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 86.130.224.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
64.113.32.29 attack
$f2bV_matches
2019-09-05 00:15:57
157.245.103.66 attackbots
Sep  4 05:21:28 lcprod sshd\[29490\]: Invalid user michele from 157.245.103.66
Sep  4 05:21:28 lcprod sshd\[29490\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.103.66
Sep  4 05:21:30 lcprod sshd\[29490\]: Failed password for invalid user michele from 157.245.103.66 port 57478 ssh2
Sep  4 05:26:17 lcprod sshd\[29924\]: Invalid user error from 157.245.103.66
Sep  4 05:26:17 lcprod sshd\[29924\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.103.66
2019-09-04 23:39:23
218.98.40.134 attackbots
Sep  4 05:20:10 hanapaa sshd\[10873\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.40.134  user=root
Sep  4 05:20:12 hanapaa sshd\[10873\]: Failed password for root from 218.98.40.134 port 53738 ssh2
Sep  4 05:20:14 hanapaa sshd\[10873\]: Failed password for root from 218.98.40.134 port 53738 ssh2
Sep  4 05:20:17 hanapaa sshd\[10873\]: Failed password for root from 218.98.40.134 port 53738 ssh2
Sep  4 05:20:30 hanapaa sshd\[10890\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.40.134  user=root
2019-09-04 23:34:22
167.71.217.110 attackspambots
Sep  4 06:09:37 kapalua sshd\[6923\]: Invalid user user from 167.71.217.110
Sep  4 06:09:37 kapalua sshd\[6923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.217.110
Sep  4 06:09:39 kapalua sshd\[6923\]: Failed password for invalid user user from 167.71.217.110 port 39272 ssh2
Sep  4 06:17:02 kapalua sshd\[7682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.217.110  user=root
Sep  4 06:17:05 kapalua sshd\[7682\]: Failed password for root from 167.71.217.110 port 43914 ssh2
2019-09-05 00:17:13
5.188.86.22 attack
firewall-block, port(s): 3380/tcp, 9805/tcp, 9812/tcp, 9814/tcp
2019-09-05 00:03:04
193.70.86.97 attackspambots
Sep  4 18:29:28 server sshd\[28193\]: User root from 193.70.86.97 not allowed because listed in DenyUsers
Sep  4 18:29:28 server sshd\[28193\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.86.97  user=root
Sep  4 18:29:30 server sshd\[28193\]: Failed password for invalid user root from 193.70.86.97 port 53796 ssh2
Sep  4 18:33:40 server sshd\[754\]: Invalid user dumpy from 193.70.86.97 port 41034
Sep  4 18:33:40 server sshd\[754\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.86.97
2019-09-04 23:42:34
51.68.189.69 attack
Sep  4 11:33:20 TORMINT sshd\[23995\]: Invalid user nick from 51.68.189.69
Sep  4 11:33:20 TORMINT sshd\[23995\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.189.69
Sep  4 11:33:22 TORMINT sshd\[23995\]: Failed password for invalid user nick from 51.68.189.69 port 37063 ssh2
...
2019-09-04 23:42:05
218.98.40.153 attackspam
Sep  4 18:22:02 piServer sshd[25650]: Failed password for root from 218.98.40.153 port 63258 ssh2
Sep  4 18:22:05 piServer sshd[25650]: Failed password for root from 218.98.40.153 port 63258 ssh2
Sep  4 18:22:08 piServer sshd[25650]: Failed password for root from 218.98.40.153 port 63258 ssh2
...
2019-09-05 00:24:42
190.8.137.33 attack
445/tcp 445/tcp 445/tcp
[2019-09-04]3pkt
2019-09-04 23:29:18
201.69.200.201 attackbots
Sep  4 16:46:21 legacy sshd[25046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.69.200.201
Sep  4 16:46:23 legacy sshd[25046]: Failed password for invalid user admins from 201.69.200.201 port 38745 ssh2
Sep  4 16:51:41 legacy sshd[25206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.69.200.201
...
2019-09-04 23:23:34
93.191.58.154 attackspam
$f2bV_matches
2019-09-05 00:07:34
92.222.47.41 attackspam
2019-09-04T15:30:27.640996abusebot.cloudsearch.cf sshd\[31010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.ip-92-222-47.eu  user=root
2019-09-04 23:41:20
158.69.217.87 attackspam
Sep  4 15:14:02 rpi sshd[3481]: Failed password for root from 158.69.217.87 port 57670 ssh2
Sep  4 15:14:06 rpi sshd[3481]: Failed password for root from 158.69.217.87 port 57670 ssh2
2019-09-04 23:21:47
91.194.211.40 attackbotsspam
Aug 30 22:38:52 itv-usvr-01 sshd[29542]: Invalid user cgi from 91.194.211.40
Aug 30 22:38:52 itv-usvr-01 sshd[29542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.194.211.40
Aug 30 22:38:52 itv-usvr-01 sshd[29542]: Invalid user cgi from 91.194.211.40
Aug 30 22:38:53 itv-usvr-01 sshd[29542]: Failed password for invalid user cgi from 91.194.211.40 port 59220 ssh2
Aug 30 22:42:31 itv-usvr-01 sshd[29782]: Invalid user ashok from 91.194.211.40
2019-09-05 00:12:37
190.232.0.206 attackbots
port scan and connect, tcp 23 (telnet)
2019-09-05 00:14:56

Recently Reported IPs

139.224.130.225 118.250.106.103 139.224.131.22 139.224.131.233
139.224.132.155 139.224.132.123 139.224.132.142 139.224.132.192
139.224.131.234 139.224.132.167 139.224.132.198 139.224.133.117
139.224.133.123 139.224.133.150 118.250.114.13 139.224.133.246
139.224.133.45 139.224.134.15 139.224.134.145 139.224.134.155