Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.242.134.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22480
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.242.134.135.		IN	A

;; AUTHORITY SECTION:
.			539	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011002 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 13:27:17 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 135.134.242.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 135.134.242.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
84.63.209.212 attack
Aug 29 05:12:38 yabzik sshd[15350]: Failed password for root from 84.63.209.212 port 39982 ssh2
Aug 29 05:21:52 yabzik sshd[18410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.63.209.212
Aug 29 05:21:54 yabzik sshd[18410]: Failed password for invalid user ftp_id from 84.63.209.212 port 34191 ssh2
2019-08-29 10:28:40
42.104.97.227 attackbots
Aug 29 04:21:39 vps691689 sshd[21970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.104.97.227
Aug 29 04:21:41 vps691689 sshd[21970]: Failed password for invalid user vagrant from 42.104.97.227 port 53193 ssh2
...
2019-08-29 10:33:02
157.230.120.252 attackspambots
Aug 29 04:24:37 vps691689 sshd[22050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.120.252
Aug 29 04:24:39 vps691689 sshd[22050]: Failed password for invalid user lxm from 157.230.120.252 port 47008 ssh2
...
2019-08-29 10:34:25
157.230.129.73 attackbotsspam
$f2bV_matches
2019-08-29 10:47:21
118.163.149.163 attackspam
2019-08-29T04:06:13.486484  sshd[22355]: Invalid user testing from 118.163.149.163 port 34258
2019-08-29T04:06:13.497154  sshd[22355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.163.149.163
2019-08-29T04:06:13.486484  sshd[22355]: Invalid user testing from 118.163.149.163 port 34258
2019-08-29T04:06:15.217125  sshd[22355]: Failed password for invalid user testing from 118.163.149.163 port 34258 ssh2
2019-08-29T04:11:08.047347  sshd[22416]: Invalid user murai from 118.163.149.163 port 51264
...
2019-08-29 10:16:54
35.222.137.80 attackbotsspam
Forbidden directory scan :: 2019/08/29 09:51:07 [error] 7635#7635: *182275 access forbidden by rule, client: 35.222.137.80, server: [censored_1], request: "GET /wp-content/uploads/wp-lister/wplister.log HTTP/1.1", host: "[censored_1]"
2019-08-29 10:54:56
185.100.86.182 attackspam
WordPress login Brute force / Web App Attack on client site.
2019-08-29 10:48:20
218.215.188.167 attack
Aug 29 01:43:13 Ubuntu-1404-trusty-64-minimal sshd\[25773\]: Invalid user raul from 218.215.188.167
Aug 29 01:43:13 Ubuntu-1404-trusty-64-minimal sshd\[25773\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.215.188.167
Aug 29 01:43:15 Ubuntu-1404-trusty-64-minimal sshd\[25773\]: Failed password for invalid user raul from 218.215.188.167 port 55764 ssh2
Aug 29 01:51:06 Ubuntu-1404-trusty-64-minimal sshd\[32582\]: Invalid user sysadmin from 218.215.188.167
Aug 29 01:51:06 Ubuntu-1404-trusty-64-minimal sshd\[32582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.215.188.167
2019-08-29 10:54:11
2.239.185.155 attackbots
Aug 29 01:51:41 herz-der-gamer sshd[31659]: Invalid user lyssa from 2.239.185.155 port 55288
Aug 29 01:51:41 herz-der-gamer sshd[31659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.239.185.155
Aug 29 01:51:41 herz-der-gamer sshd[31659]: Invalid user lyssa from 2.239.185.155 port 55288
Aug 29 01:51:42 herz-der-gamer sshd[31659]: Failed password for invalid user lyssa from 2.239.185.155 port 55288 ssh2
...
2019-08-29 10:29:18
59.100.246.170 attack
Aug 29 04:00:42 lnxmysql61 sshd[3814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.100.246.170
2019-08-29 10:36:09
222.87.0.79 attack
Aug 28 16:30:38 hiderm sshd\[24992\]: Invalid user murphy from 222.87.0.79
Aug 28 16:30:38 hiderm sshd\[24992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.87.0.79
Aug 28 16:30:40 hiderm sshd\[24992\]: Failed password for invalid user murphy from 222.87.0.79 port 59787 ssh2
Aug 28 16:34:46 hiderm sshd\[25322\]: Invalid user password from 222.87.0.79
Aug 28 16:34:46 hiderm sshd\[25322\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.87.0.79
2019-08-29 10:35:14
148.70.201.162 attackbots
Automatic report - Banned IP Access
2019-08-29 11:01:48
222.211.83.166 attackbotsspam
Aug 29 02:56:33 mail sshd\[3206\]: Failed password for invalid user vintage from 222.211.83.166 port 49220 ssh2
Aug 29 03:12:30 mail sshd\[3346\]: Invalid user nuc from 222.211.83.166 port 52520
Aug 29 03:12:30 mail sshd\[3346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.211.83.166
...
2019-08-29 10:25:51
177.184.133.41 attackbots
Aug 29 02:09:53 www sshd\[15146\]: Invalid user u1 from 177.184.133.41 port 52900
...
2019-08-29 10:53:30
51.68.173.108 attackspambots
SSH Brute-Force reported by Fail2Ban
2019-08-29 10:33:36

Recently Reported IPs

5.127.161.136 172.13.203.149 19.161.252.239 59.141.165.20
193.249.199.227 146.65.220.249 12.39.88.120 1.167.80.25
22.239.121.48 187.31.138.207 232.34.31.154 47.95.43.137
180.188.210.151 36.55.38.197 154.192.228.65 182.157.143.208
162.115.14.7 87.196.214.28 186.106.96.56 22.122.232.123