Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
139.255.4.205 attackspam
Ssh brute force
2020-10-10 08:01:42
139.255.4.205 attack
SSH Brute-Force Attack
2020-10-10 00:24:57
139.255.4.205 attack
2020-10-09T07:13:01.059628abusebot-8.cloudsearch.cf sshd[31483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.255.4.205  user=root
2020-10-09T07:13:02.793649abusebot-8.cloudsearch.cf sshd[31483]: Failed password for root from 139.255.4.205 port 39468 ssh2
2020-10-09T07:17:21.710909abusebot-8.cloudsearch.cf sshd[31510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.255.4.205  user=root
2020-10-09T07:17:23.806488abusebot-8.cloudsearch.cf sshd[31510]: Failed password for root from 139.255.4.205 port 44494 ssh2
2020-10-09T07:21:48.724528abusebot-8.cloudsearch.cf sshd[31582]: Invalid user testuser from 139.255.4.205 port 49548
2020-10-09T07:21:48.732775abusebot-8.cloudsearch.cf sshd[31582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.255.4.205
2020-10-09T07:21:48.724528abusebot-8.cloudsearch.cf sshd[31582]: Invalid user testuser from 139.255.4.205 port
...
2020-10-09 16:11:05
139.255.4.205 attack
SSH brutforce
2020-10-08 03:39:30
139.255.4.205 attackbotsspam
malicious Brute-Force reported by https://www.patrick-binder.de
...
2020-10-07 19:55:39
139.255.4.205 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-10-07 01:26:35
139.255.4.205 attack
Scanned 3 times in the last 24 hours on port 22
2020-10-06 17:20:48
139.255.47.42 attack
20/9/1@00:45:00: FAIL: Alarm-Network address from=139.255.47.42
...
2020-09-01 18:53:57
139.255.47.62 attackspambots
Unauthorized connection attempt from IP address 139.255.47.62 on Port 445(SMB)
2020-04-27 00:31:03
139.255.40.138 attackbotsspam
unauthorized connection attempt
2020-02-26 14:15:43
139.255.47.221 attackspambots
Port 1433 Scan
2020-02-19 19:01:43
139.255.47.218 attack
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-02-18 20:32:21
139.255.43.122 attack
Unauthorized connection attempt from IP address 139.255.43.122 on Port 445(SMB)
2020-01-08 19:35:15
139.255.47.218 attack
Unauthorized connection attempt detected from IP address 139.255.47.218 to port 1433 [T]
2020-01-07 03:32:11
139.255.40.138 attackspam
Unauthorized connection attempt from IP address 139.255.40.138 on Port 445(SMB)
2020-01-01 20:20:47
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.255.4.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47533
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.255.4.81.			IN	A

;; AUTHORITY SECTION:
.			580	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:30:00 CST 2022
;; MSG SIZE  rcvd: 105
Host info
81.4.255.139.in-addr.arpa domain name pointer ln-static-139-255-4-81.link.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
81.4.255.139.in-addr.arpa	name = ln-static-139-255-4-81.link.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
46.101.164.27 attackspam
firewall-block, port(s): 25251/tcp
2020-09-01 07:47:18
222.79.50.141 attack
xeon.petend.hu:80 222.79.50.141 - - [31/Aug/2020:22:58:13 +0200] "CONNECT xeon.petend.hu:443 HTTP/1.1" 302 503 "-" "PycURL/7.43.0 libcurl/7.47.0 GnuTLS/3.4.10 zlib/1.2.8 libidn/1.32 librtmp/2.3"
2020-09-01 07:51:03
94.102.51.28 attack
Port scan on 18 port(s): 714 1877 7854 13420 13456 14002 17214 18704 20167 27166 28515 32236 32832 34961 38435 42174 45320 46411
2020-09-01 08:00:54
200.236.121.127 attack
Automatic report - Port Scan Attack
2020-09-01 08:14:01
94.102.50.155 attackspam
" "
2020-09-01 07:44:57
140.207.81.233 attackspam
Failed password for root from 140.207.81.233 port 2075 ssh2
2020-09-01 08:04:36
217.182.79.176 attackspam
Failed password for root from 217.182.79.176 port 42584 ssh2
2020-09-01 07:38:15
139.59.161.78 attack
Sep  1 00:14:55 server sshd[20617]: Failed password for invalid user root from 139.59.161.78 port 54893 ssh2
Sep  1 00:14:53 server sshd[20617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.161.78  user=root
Sep  1 00:14:53 server sshd[20617]: User root from 139.59.161.78 not allowed because listed in DenyUsers
Sep  1 00:14:55 server sshd[20617]: Failed password for invalid user root from 139.59.161.78 port 54893 ssh2
Sep  1 00:29:23 server sshd[31415]: User root from 139.59.161.78 not allowed because listed in DenyUsers
...
2020-09-01 07:46:30
103.131.71.98 attack
(mod_security) mod_security (id:210730) triggered by 103.131.71.98 (VN/Vietnam/bot-103-131-71-98.coccoc.com): 5 in the last 3600 secs
2020-09-01 07:41:39
192.99.149.195 attack
GET /wp-login.php HTTP/1.1 404 457 - Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0
2020-09-01 08:11:24
134.209.7.179 attack
2020-08-31T16:57:02.538176linuxbox-skyline sshd[5463]: Invalid user wxl from 134.209.7.179 port 50002
...
2020-09-01 07:50:02
66.98.45.243 attackspam
firewall-block, port(s): 21568/tcp
2020-09-01 07:48:21
104.248.205.24 attackbots
Scanned 3 times in the last 24 hours on port 22
2020-09-01 08:09:03
103.145.13.201 attackspambots
[2020-08-31 19:51:44] NOTICE[1185][C-00009170] chan_sip.c: Call from '' (103.145.13.201:65479) to extension '9442037699492' rejected because extension not found in context 'public'.
[2020-08-31 19:51:44] SECURITY[1203] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-31T19:51:44.733-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9442037699492",SessionID="0x7f10c405a408",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/103.145.13.201/65479",ACLName="no_extension_match"
[2020-08-31 19:52:08] NOTICE[1185][C-00009172] chan_sip.c: Call from '' (103.145.13.201:56917) to extension '901146812400621' rejected because extension not found in context 'public'.
[2020-08-31 19:52:08] SECURITY[1203] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-31T19:52:08.169-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="901146812400621",SessionID="0x7f10c4286a78",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/1
...
2020-09-01 08:00:35
201.90.101.165 attack
2020-09-01T06:43:33.625692hostname sshd[19683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.90.101.165  user=root
2020-09-01T06:43:35.278666hostname sshd[19683]: Failed password for root from 201.90.101.165 port 58686 ssh2
...
2020-09-01 08:00:15

Recently Reported IPs

139.255.40.130 118.254.140.48 139.255.40.154 139.255.48.5
139.255.48.162 139.255.51.250 139.255.50.180 118.254.140.5
139.255.52.70 139.255.53.85 139.255.48.164 139.255.55.146
139.255.55.34 139.255.54.106 139.255.55.10 139.255.56.18
139.255.54.186 139.255.57.18 139.255.57.1 139.255.57.32