Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.255.142.163
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30791
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.255.142.163.		IN	A

;; AUTHORITY SECTION:
.			79	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:29:04 CST 2022
;; MSG SIZE  rcvd: 108
Host info
163.142.255.139.in-addr.arpa domain name pointer ln-static-139-255-142-163.link.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
163.142.255.139.in-addr.arpa	name = ln-static-139-255-142-163.link.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.236.253.28 attack
ssh failed login
2019-08-19 01:34:11
129.226.58.168 attackbots
Sql/code injection probe
2019-08-19 01:03:45
209.121.153.63 attackspam
RDP Scan
2019-08-19 01:47:57
119.188.248.171 attack
Aug 18 13:12:57 web1 postfix/smtpd[25929]: warning: unknown[119.188.248.171]: SASL LOGIN authentication failed: authentication failure
...
2019-08-19 01:40:05
80.82.64.116 attackbotsspam
Aug 18 17:33:04 h2177944 kernel: \[4466052.771660\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=80.82.64.116 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=492 PROTO=TCP SPT=45154 DPT=13446 WINDOW=1024 RES=0x00 SYN URGP=0 
Aug 18 17:41:57 h2177944 kernel: \[4466586.143100\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=80.82.64.116 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=25631 PROTO=TCP SPT=45154 DPT=13413 WINDOW=1024 RES=0x00 SYN URGP=0 
Aug 18 17:49:40 h2177944 kernel: \[4467048.830910\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=80.82.64.116 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=45285 PROTO=TCP SPT=45154 DPT=13480 WINDOW=1024 RES=0x00 SYN URGP=0 
Aug 18 17:53:10 h2177944 kernel: \[4467258.471332\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=80.82.64.116 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=62919 PROTO=TCP SPT=45188 DPT=13721 WINDOW=1024 RES=0x00 SYN URGP=0 
Aug 18 18:14:39 h2177944 kernel: \[4468547.094968\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=80.82.64.116 DST=85.214.117.9 LE
2019-08-19 01:16:08
175.211.112.246 attackspam
Aug 18 19:04:24 v22018076622670303 sshd\[29881\]: Invalid user zj from 175.211.112.246 port 41994
Aug 18 19:04:24 v22018076622670303 sshd\[29881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.211.112.246
Aug 18 19:04:25 v22018076622670303 sshd\[29881\]: Failed password for invalid user zj from 175.211.112.246 port 41994 ssh2
...
2019-08-19 01:50:39
106.12.194.79 attackspambots
2019-08-18T15:40:01.558910abusebot-7.cloudsearch.cf sshd\[10966\]: Invalid user abc1 from 106.12.194.79 port 34228
2019-08-19 01:04:35
112.186.77.122 attack
Aug 18 17:37:26 XXX sshd[15829]: Invalid user ofsaa from 112.186.77.122 port 36974
2019-08-19 01:25:45
190.192.52.183 attackspambots
$f2bV_matches
2019-08-19 01:48:25
94.60.116.71 attack
Aug 18 14:40:04 XXX sshd[12530]: Invalid user ofsaa from 94.60.116.71 port 58236
2019-08-19 01:24:41
62.24.102.106 attackspam
Aug 18 16:01:16 legacy sshd[16631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.24.102.106
Aug 18 16:01:18 legacy sshd[16631]: Failed password for invalid user toor from 62.24.102.106 port 24358 ssh2
Aug 18 16:06:43 legacy sshd[16784]: Failed password for www-data from 62.24.102.106 port 24136 ssh2
...
2019-08-19 01:23:54
104.40.49.47 attack
Aug 18 19:42:55 motanud sshd\[19538\]: Invalid user submit from 104.40.49.47 port 44590
Aug 18 19:42:55 motanud sshd\[19538\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.40.49.47
Aug 18 19:42:57 motanud sshd\[19538\]: Failed password for invalid user submit from 104.40.49.47 port 44590 ssh2
2019-08-19 01:20:12
165.22.102.107 attackbots
$f2bV_matches
2019-08-19 01:11:01
181.118.206.48 attackspambots
Unauthorized connection attempt from IP address 181.118.206.48 on Port 445(SMB)
2019-08-19 01:42:33
190.111.249.177 attack
Mar 25 10:33:03 vtv3 sshd\[28558\]: Invalid user o from 190.111.249.177 port 48050
Mar 25 10:33:03 vtv3 sshd\[28558\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.111.249.177
Mar 25 10:33:05 vtv3 sshd\[28558\]: Failed password for invalid user o from 190.111.249.177 port 48050 ssh2
Mar 25 10:39:40 vtv3 sshd\[31259\]: Invalid user nf from 190.111.249.177 port 37611
Mar 25 10:39:40 vtv3 sshd\[31259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.111.249.177
Mar 28 01:40:35 vtv3 sshd\[8247\]: Invalid user rr from 190.111.249.177 port 57888
Mar 28 01:40:35 vtv3 sshd\[8247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.111.249.177
Mar 28 01:40:37 vtv3 sshd\[8247\]: Failed password for invalid user rr from 190.111.249.177 port 57888 ssh2
Mar 28 01:48:57 vtv3 sshd\[11445\]: Invalid user it from 190.111.249.177 port 48937
Mar 28 01:48:57 vtv3 sshd\[11445\]: pam_unix\(
2019-08-19 01:15:03

Recently Reported IPs

139.255.142.157 139.255.142.139 139.255.142.130 139.255.142.143
139.255.142.164 139.255.142.169 118.250.2.184 139.255.144.13
139.255.144.159 139.255.144.165 139.255.144.16 139.255.144.194
139.255.144.4 139.255.145.68 139.255.145.31 139.255.145.44
118.250.2.189 139.255.145.182 139.255.144.172 139.255.149.156