Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.234.55.165
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22143
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.234.55.165.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 19:14:09 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 165.55.234.139.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 139.234.55.165.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
58.87.70.210 attackbots
Invalid user user from 58.87.70.210 port 36988
2020-05-14 00:48:54
42.159.92.93 attackspambots
2020-05-13T12:27:54.094536abusebot-2.cloudsearch.cf sshd[5605]: Invalid user providencia from 42.159.92.93 port 41576
2020-05-13T12:27:54.103137abusebot-2.cloudsearch.cf sshd[5605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.92.93
2020-05-13T12:27:54.094536abusebot-2.cloudsearch.cf sshd[5605]: Invalid user providencia from 42.159.92.93 port 41576
2020-05-13T12:27:55.786440abusebot-2.cloudsearch.cf sshd[5605]: Failed password for invalid user providencia from 42.159.92.93 port 41576 ssh2
2020-05-13T12:35:11.391327abusebot-2.cloudsearch.cf sshd[5667]: Invalid user arkserver from 42.159.92.93 port 40616
2020-05-13T12:35:11.396652abusebot-2.cloudsearch.cf sshd[5667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.92.93
2020-05-13T12:35:11.391327abusebot-2.cloudsearch.cf sshd[5667]: Invalid user arkserver from 42.159.92.93 port 40616
2020-05-13T12:35:13.070072abusebot-2.cloudsearch.cf sshd[56
...
2020-05-14 01:10:44
122.51.178.207 attackspam
May 13 14:34:13 v22018086721571380 sshd[24964]: Failed password for invalid user restart from 122.51.178.207 port 37716 ssh2
2020-05-14 00:45:43
115.58.199.230 attack
Invalid user ban from 115.58.199.230 port 24550
2020-05-14 01:11:50
134.209.85.8 attackbots
13.05.2020 14:35:46 - Login Fail on hMailserver 
Detected by ELinOX-hMail-A2F
2020-05-14 00:43:52
222.252.50.237 attackbots
1589373309 - 05/13/2020 14:35:09 Host: 222.252.50.237/222.252.50.237 Port: 445 TCP Blocked
2020-05-14 01:15:08
157.230.190.90 attack
2020-05-13T15:49:08.982709abusebot-2.cloudsearch.cf sshd[7988]: Invalid user admin from 157.230.190.90 port 37804
2020-05-13T15:49:08.987999abusebot-2.cloudsearch.cf sshd[7988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.190.90
2020-05-13T15:49:08.982709abusebot-2.cloudsearch.cf sshd[7988]: Invalid user admin from 157.230.190.90 port 37804
2020-05-13T15:49:11.220450abusebot-2.cloudsearch.cf sshd[7988]: Failed password for invalid user admin from 157.230.190.90 port 37804 ssh2
2020-05-13T15:54:45.533077abusebot-2.cloudsearch.cf sshd[8084]: Invalid user flw from 157.230.190.90 port 48320
2020-05-13T15:54:45.538305abusebot-2.cloudsearch.cf sshd[8084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.190.90
2020-05-13T15:54:45.533077abusebot-2.cloudsearch.cf sshd[8084]: Invalid user flw from 157.230.190.90 port 48320
2020-05-13T15:54:47.034610abusebot-2.cloudsearch.cf sshd[8084]: Failed pass
...
2020-05-14 00:54:18
222.186.180.41 attack
May 13 18:56:35 * sshd[29269]: Failed password for root from 222.186.180.41 port 46254 ssh2
May 13 18:56:47 * sshd[29269]: error: maximum authentication attempts exceeded for root from 222.186.180.41 port 46254 ssh2 [preauth]
2020-05-14 00:58:50
106.13.63.215 attackspam
$f2bV_matches
2020-05-14 01:03:57
222.186.180.223 attackspam
May 13 19:50:30 ift sshd\[30938\]: Failed password for root from 222.186.180.223 port 4486 ssh2May 13 19:50:34 ift sshd\[30938\]: Failed password for root from 222.186.180.223 port 4486 ssh2May 13 19:50:41 ift sshd\[30938\]: Failed password for root from 222.186.180.223 port 4486 ssh2May 13 19:50:57 ift sshd\[30982\]: Failed password for root from 222.186.180.223 port 58250 ssh2May 13 19:51:00 ift sshd\[30982\]: Failed password for root from 222.186.180.223 port 58250 ssh2
...
2020-05-14 00:55:26
129.204.122.242 attackbots
SSH Brute Force
2020-05-14 00:56:45
177.205.131.217 attack
Automatic report - Port Scan Attack
2020-05-14 01:21:00
151.26.94.18 attackspambots
13.05.2020 14:35:16 - SMTP Spam without Auth on hMailserver 
Detected by ELinOX-hMail-A2F
2020-05-14 01:15:38
1.192.121.238 attackspambots
May 13 14:55:25 vps sshd[518477]: Failed password for invalid user ddd from 1.192.121.238 port 47918 ssh2
May 13 14:57:50 vps sshd[527363]: Invalid user lg from 1.192.121.238 port 60628
May 13 14:57:50 vps sshd[527363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.192.121.238
May 13 14:57:52 vps sshd[527363]: Failed password for invalid user lg from 1.192.121.238 port 60628 ssh2
May 13 15:00:02 vps sshd[535676]: Invalid user gaurav from 1.192.121.238 port 45115
...
2020-05-14 00:53:03
71.6.147.254 attackspambots
Unauthorized connection attempt detected from IP address 71.6.147.254 to port 70
2020-05-14 00:40:55

Recently Reported IPs

2.36.37.155 25.247.60.202 238.85.69.127 120.125.223.210
73.142.209.189 131.208.202.136 127.22.82.104 166.110.123.155
194.118.69.120 78.0.141.144 123.201.204.108 15.215.123.101
36.29.179.214 160.236.152.55 113.64.94.252 188.184.58.225
69.227.221.16 18.168.136.112 248.159.170.53 55.45.91.196