Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.246.189.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38800
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.246.189.55.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020201 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 11:02:19 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 55.189.246.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 55.189.246.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.38.234.54 attackspam
Jul 16 13:15:31 lnxmail61 sshd[13346]: Failed password for root from 51.38.234.54 port 52914 ssh2
Jul 16 13:15:31 lnxmail61 sshd[13346]: Failed password for root from 51.38.234.54 port 52914 ssh2
2019-07-16 19:44:13
51.75.206.146 attack
Jul 16 12:29:09 debian sshd\[14726\]: Invalid user marketing from 51.75.206.146 port 40190
Jul 16 12:29:09 debian sshd\[14726\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.206.146
...
2019-07-16 19:35:19
220.231.47.58 attack
Jul 16 12:30:21 debian sshd\[14760\]: Invalid user sandeep from 220.231.47.58 port 42521
Jul 16 12:30:21 debian sshd\[14760\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.231.47.58
...
2019-07-16 19:50:50
134.73.161.236 attackspam
Lines containing failures of 134.73.161.236
Jul 16 01:07:48 install sshd[25262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.73.161.236  user=r.r
Jul 16 01:07:50 install sshd[25262]: Failed password for r.r from 134.73.161.236 port 48736 ssh2
Jul 16 01:07:50 install sshd[25262]: Received disconnect from 134.73.161.236 port 48736:11: Bye Bye [preauth]
Jul 16 01:07:50 install sshd[25262]: Disconnected from authenticating user r.r 134.73.161.236 port 48736 [preauth]
Jul 16 03:10:56 install sshd[14667]: Invalid user centos from 134.73.161.236 port 49104
Jul 16 03:10:56 install sshd[14667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.73.161.236
Jul 16 03:10:58 install sshd[14667]: Failed password for invalid user centos from 134.73.161.236 port 49104 ssh2
Jul 16 03:10:58 install sshd[14667]: Received disconnect from 134.73.161.236 port 49104:11: Bye Bye [preauth]
Jul 16 03:10:58 in........
------------------------------
2019-07-16 19:03:54
45.7.230.226 attack
Jul 16 12:31:13 fr01 sshd[24831]: Invalid user vodafone from 45.7.230.226
Jul 16 12:31:13 fr01 sshd[24831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.7.230.226
Jul 16 12:31:13 fr01 sshd[24831]: Invalid user vodafone from 45.7.230.226
Jul 16 12:31:15 fr01 sshd[24831]: Failed password for invalid user vodafone from 45.7.230.226 port 53084 ssh2
Jul 16 12:41:35 fr01 sshd[26724]: Invalid user zhu from 45.7.230.226
...
2019-07-16 19:16:37
159.65.183.47 attackspam
Jul 16 07:32:56 plusreed sshd[22163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.183.47  user=root
Jul 16 07:32:58 plusreed sshd[22163]: Failed password for root from 159.65.183.47 port 40594 ssh2
...
2019-07-16 19:35:03
80.82.70.62 attackbots
abuse-sasl
2019-07-16 19:27:38
77.55.210.232 attack
Automatic report - Banned IP Access
2019-07-16 19:04:33
80.199.0.78 attack
abuse-sasl
2019-07-16 19:47:31
181.111.181.50 attackspam
2019-07-16T10:58:24.092070abusebot-6.cloudsearch.cf sshd\[2378\]: Invalid user divya from 181.111.181.50 port 42402
2019-07-16 19:08:20
112.186.77.82 attack
Jul 16 13:15:16 localhost sshd\[10253\]: Invalid user v from 112.186.77.82 port 53336
Jul 16 13:15:16 localhost sshd\[10253\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.186.77.82
Jul 16 13:15:18 localhost sshd\[10253\]: Failed password for invalid user v from 112.186.77.82 port 53336 ssh2
2019-07-16 19:52:03
203.93.163.82 attack
Jul 16 12:41:03 MK-Soft-Root2 sshd\[24540\]: Invalid user ftpadmin from 203.93.163.82 port 27582
Jul 16 12:41:03 MK-Soft-Root2 sshd\[24540\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.93.163.82
Jul 16 12:41:05 MK-Soft-Root2 sshd\[24540\]: Failed password for invalid user ftpadmin from 203.93.163.82 port 27582 ssh2
...
2019-07-16 19:04:12
85.26.40.243 attack
Jul 16 04:15:19 cac1d2 sshd\[20977\]: Invalid user liza from 85.26.40.243 port 48152
Jul 16 04:15:19 cac1d2 sshd\[20977\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.26.40.243
Jul 16 04:15:21 cac1d2 sshd\[20977\]: Failed password for invalid user liza from 85.26.40.243 port 48152 ssh2
...
2019-07-16 19:50:27
92.222.84.34 attackspam
Jul 16 13:33:11 SilenceServices sshd[19454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.84.34
Jul 16 13:33:13 SilenceServices sshd[19454]: Failed password for invalid user ie from 92.222.84.34 port 36802 ssh2
Jul 16 13:37:37 SilenceServices sshd[22059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.84.34
2019-07-16 19:49:54
134.73.129.250 attackspambots
Automatic report - SSH Brute-Force Attack
2019-07-16 19:25:03

Recently Reported IPs

72.103.62.23 97.55.221.67 223.232.101.166 47.113.35.231
157.8.110.254 133.155.237.42 250.218.15.79 230.40.86.44
154.39.28.3 83.166.90.220 78.123.92.47 25.150.167.217
52.66.166.164 190.172.141.177 179.24.219.61 44.57.208.145
6.93.122.61 66.126.115.28 146.159.142.70 220.140.101.120