Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: PT. First Media TBK

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspambots
Aug 10 13:54:30 mxgate1 postfix/postscreen[6092]: CONNECT from [139.255.181.180]:28992 to [176.31.12.44]:25
Aug 10 13:54:30 mxgate1 postfix/dnsblog[6112]: addr 139.255.181.180 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Aug 10 13:54:30 mxgate1 postfix/dnsblog[6115]: addr 139.255.181.180 listed by domain zen.spamhaus.org as 127.0.0.4
Aug 10 13:54:30 mxgate1 postfix/dnsblog[6112]: addr 139.255.181.180 listed by domain cbl.abuseat.org as 127.0.0.2
Aug 10 13:54:30 mxgate1 postfix/dnsblog[6115]: addr 139.255.181.180 listed by domain zen.spamhaus.org as 127.0.0.11
Aug 10 13:54:30 mxgate1 postfix/dnsblog[6113]: addr 139.255.181.180 listed by domain b.barracudacentral.org as 127.0.0.2
Aug 10 13:54:36 mxgate1 postfix/postscreen[6092]: DNSBL rank 5 for [139.255.181.180]:28992
Aug x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=139.255.181.180
2020-08-11 00:31:24
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.255.181.180
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63459
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.255.181.180.		IN	A

;; AUTHORITY SECTION:
.			570	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020081000 1800 900 604800 86400

;; Query time: 79 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Aug 11 00:31:17 CST 2020
;; MSG SIZE  rcvd: 119
Host info
180.181.255.139.in-addr.arpa domain name pointer ln-static-139-255-181-180.link.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
180.181.255.139.in-addr.arpa	name = ln-static-139-255-181-180.link.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.110.232.194 attackbots
Email rejected due to spam filtering
2020-02-25 19:58:32
198.108.67.85 attackspambots
firewall-block, port(s): 9026/tcp
2020-02-25 20:26:16
116.109.33.244 attack
Automatic report - Port Scan Attack
2020-02-25 20:12:32
85.93.20.10 attack
DATE:2020-02-25 12:49:17, IP:85.93.20.10, PORT:3306 SQL brute force auth on honeypot MySQL/MariaDB server (epe-honey1-hq)
2020-02-25 20:29:50
200.70.56.204 attackbots
2020-02-25T11:41:01.390772shield sshd\[403\]: Invalid user abc from 200.70.56.204 port 52890
2020-02-25T11:41:01.395185shield sshd\[403\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.70.56.204
2020-02-25T11:41:03.784209shield sshd\[403\]: Failed password for invalid user abc from 200.70.56.204 port 52890 ssh2
2020-02-25T11:50:17.649445shield sshd\[3137\]: Invalid user backup from 200.70.56.204 port 57486
2020-02-25T11:50:17.655537shield sshd\[3137\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.70.56.204
2020-02-25 20:00:09
187.94.210.37 attack
Automatic report - Port Scan Attack
2020-02-25 20:34:13
190.145.25.166 attackbots
Feb 25 01:22:11 web1 sshd\[5550\]: Invalid user cas from 190.145.25.166
Feb 25 01:22:11 web1 sshd\[5550\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.25.166
Feb 25 01:22:13 web1 sshd\[5550\]: Failed password for invalid user cas from 190.145.25.166 port 42578 ssh2
Feb 25 01:31:51 web1 sshd\[6405\]: Invalid user duser from 190.145.25.166
Feb 25 01:31:51 web1 sshd\[6405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.25.166
2020-02-25 20:33:12
159.192.96.27 attack
Port 1433 Scan
2020-02-25 20:15:40
213.230.73.181 attack
Email rejected due to spam filtering
2020-02-25 20:08:45
181.115.10.42 attackbotsspam
Email rejected due to spam filtering
2020-02-25 20:03:34
36.68.54.48 attackspam
Unauthorized connection attempt detected from IP address 36.68.54.48 to port 445
2020-02-25 20:02:51
104.37.47.7 attack
this URL continuously (CONTINUOUSLY) attempts to send TROJAN material on an INCOMING attack :-(
2020-02-25 20:35:33
79.127.99.95 attackbots
firewall-block, port(s): 81/tcp
2020-02-25 20:27:31
185.137.84.126 attackspam
Portscan or hack attempt detected by psad/fwsnort
2020-02-25 20:09:22
1.179.137.10 attack
2020-02-25T22:51:13.481944luisaranguren sshd[1168453]: Failed password for invalid user db2fenc1 from 1.179.137.10 port 39743 ssh2
2020-02-25T22:51:13.774752luisaranguren sshd[1168453]: Disconnected from invalid user db2fenc1 1.179.137.10 port 39743 [preauth]
...
2020-02-25 20:14:48

Recently Reported IPs

61.106.15.74 2.91.15.179 110.137.39.40 192.141.207.42
198.50.152.64 170.150.103.92 161.82.172.94 85.104.67.135
79.112.143.33 118.68.165.9 37.34.176.198 217.113.114.80
170.238.141.139 103.255.9.25 178.144.100.94 185.132.53.54
101.93.19.178 94.25.181.228 189.38.192.113 185.153.197.52