Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.255.161.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22916
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.255.161.11.			IN	A

;; AUTHORITY SECTION:
.			597	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:29:28 CST 2022
;; MSG SIZE  rcvd: 107
Host info
11.161.255.139.in-addr.arpa domain name pointer ln-static-139-255-161-11.link.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
11.161.255.139.in-addr.arpa	name = ln-static-139-255-161-11.link.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
90.154.151.55 attackbotsspam
Feb1320:09:17server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=90.154.151.55DST=136.243.224.52LEN=52TOS=0x00PREC=0x00TTL=120ID=5014DFPROTO=TCPSPT=63111DPT=8291WINDOW=17520RES=0x00SYNURGP=0Feb1320:09:17server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=90.154.151.55DST=136.243.224.51LEN=52TOS=0x00PREC=0x00TTL=120ID=17997DFPROTO=TCPSPT=63108DPT=8291WINDOW=17520RES=0x00SYNURGP=0Feb1320:09:17server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=90.154.151.55DST=136.243.224.50LEN=52TOS=0x00PREC=0x00TTL=120ID=238DFPROTO=TCPSPT=63106DPT=8291WINDOW=17520RES=0x00SYNURGP=0Feb1320:09:17server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=90.154.151.55DST=136.243.224.55LEN=52TOS=0x00PREC=0x00TTL=120ID=28432DFPROTO=TCPSPT=63120DPT=8291WINDOW=17520RES=0x00SYNURGP=0Feb1320:09:17server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:
2020-02-14 08:11:55
114.39.176.203 attackspambots
400 BAD REQUEST
2020-02-14 07:49:10
206.189.232.174 attackbotsspam
kernel: [1349891.741063] portscan:IN=eth0 OUT= MAC=9e:11:7f:4a:a0:76:30:7c:5e:91:9c:30:08:00 SRC=206.189.232.174

PORT      STATE SERVICE       VERSION
135/tcp   open  msrpc         Microsoft Windows RPC
139/tcp   open  netbios-ssn   Microsoft Windows netbios-ssn
3389/tcp  open  ms-wbt-server Microsoft Terminal Service
4899/tcp  open  radmin        Famatech Radmin 3.X (Radmin Authentication)
5357/tcp  open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
49152/tcp open  msrpc         Microsoft Windows RPC
49153/tcp open  msrpc         Microsoft Windows RPC
49154/tcp open  msrpc         Microsoft Windows RPC
49158/tcp open  msrpc         Microsoft Windows RPC
49159/tcp open  msrpc         Microsoft Windows RPC
49160/tcp open  msrpc         Microsoft Windows RPC
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
2020-02-14 08:04:30
165.227.210.71 attackspam
Invalid user dch from 165.227.210.71 port 47730
2020-02-14 07:50:43
49.88.112.65 attackbots
Feb 13 14:16:01 hanapaa sshd\[24087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
Feb 13 14:16:04 hanapaa sshd\[24087\]: Failed password for root from 49.88.112.65 port 24292 ssh2
Feb 13 14:17:10 hanapaa sshd\[24173\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
Feb 13 14:17:12 hanapaa sshd\[24173\]: Failed password for root from 49.88.112.65 port 27173 ssh2
Feb 13 14:18:21 hanapaa sshd\[24250\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
2020-02-14 08:25:33
2.180.17.220 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 08:08:27
95.84.184.149 attack
Invalid user guest2 from 95.84.184.149 port 54912
2020-02-14 07:57:20
84.204.6.78 attack
firewall-block, port(s): 9530/tcp
2020-02-14 07:48:18
2.181.197.141 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 08:05:59
175.141.246.122 attackbots
Ssh brute force
2020-02-14 08:07:11
45.71.129.33 attackbots
firewall-block, port(s): 8291/tcp
2020-02-14 07:55:14
45.55.188.133 attackspambots
Hacking
2020-02-14 08:05:45
2.219.209.35 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 07:55:44
83.28.50.110 attackbots
Feb 13 12:38:18 web1 sshd\[29854\]: Invalid user stg from 83.28.50.110
Feb 13 12:38:18 web1 sshd\[29854\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.28.50.110
Feb 13 12:38:21 web1 sshd\[29854\]: Failed password for invalid user stg from 83.28.50.110 port 55746 ssh2
Feb 13 12:41:19 web1 sshd\[30183\]: Invalid user vbox from 83.28.50.110
Feb 13 12:41:19 web1 sshd\[30183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.28.50.110
2020-02-14 07:58:07
88.247.164.101 attackspambots
firewall-block, port(s): 81/tcp
2020-02-14 07:45:44

Recently Reported IPs

139.255.160.34 139.255.160.6 139.255.160.52 139.255.160.96
139.255.160.88 139.255.162.236 139.255.161.44 139.255.162.84
139.255.164.97 139.255.165.141 118.250.2.51 139.255.165.40
139.255.17.130 139.255.17.138 139.255.17.2 139.255.17.170
139.255.17.174 139.255.17.203 139.255.17.200 139.255.17.226