Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Romania

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
139.28.218.34 attack
22/tcp 27017/tcp 5900/tcp...
[2020-05-05/07-05]41pkt,14pt.(tcp),3pt.(udp)
2020-07-06 01:59:22
139.28.218.34 attack
" "
2020-06-07 23:09:09
139.28.218.34 attack
 TCP (SYN) 139.28.218.34:57239 -> port 11211, len 44
2020-05-24 18:34:57
139.28.218.77 attack
Brute force attack against VPN service
2020-04-18 14:09:10
139.28.218.34 attack
Honeypot hit.
2020-04-17 06:58:59
139.28.218.34 attackbotsspam
Honeypot hit.
2020-02-18 23:28:51
139.28.218.34 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-13 18:29:58
139.28.218.34 attackbotsspam
" "
2020-02-04 17:02:15
139.28.218.34 attack
Portscan or hack attempt detected by psad/fwsnort
2020-01-11 08:28:43
139.28.218.34 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-15 05:38:57
139.28.218.28 attackbots
TCP Port Scanning
2019-11-18 21:04:33
139.28.218.34 attack
Scanning random ports - tries to find possible vulnerable services
2019-11-03 07:56:18
139.28.218.34 attackbotsspam
VN - 1H : (90)  Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : VN 
 NAME ASN : ASN9009 
 
 IP : 139.28.218.34 
 
 CIDR : 139.28.218.0/24 
 
 PREFIX COUNT : 1708 
 
 UNIQUE IP COUNT : 749056 
 
 
 WYKRYTE ATAKI Z ASN9009 :  
  1H - 1 
  3H - 3 
  6H - 5 
 12H - 7 
 24H - 9 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery 
  https://help-dysk.pl
2019-09-11 23:33:40
139.28.218.130 attackspambots
Postfix DNSBL listed. Trying to send SPAM.
2019-07-08 02:56:39
139.28.218.137 attackbotsspam
Postfix DNSBL listed. Trying to send SPAM.
2019-06-27 22:09:25
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.28.218.155
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1913
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.28.218.155.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019040200 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Tue Apr 02 15:07:20 +08 2019
;; MSG SIZE  rcvd: 118

Host info
155.218.28.139.in-addr.arpa domain name pointer beds.ductinmedi.com.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
155.218.28.139.in-addr.arpa	name = beds.ductinmedi.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
217.165.22.147 attackbots
<6 unauthorized SSH connections
2020-07-05 16:18:52
219.250.188.144 attack
Invalid user tony from 219.250.188.144 port 45942
2020-07-05 16:17:32
129.211.22.55 attackbotsspam
$f2bV_matches
2020-07-05 16:04:09
42.113.197.217 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-07-05 15:57:08
111.26.172.222 attack
Brute Force attack - banned by Fail2Ban
2020-07-05 15:51:19
72.201.3.109 attackbots
$f2bV_matches
2020-07-05 15:38:33
112.85.42.237 attackspambots
Jul  5 03:39:24 NPSTNNYC01T sshd[1423]: Failed password for root from 112.85.42.237 port 36149 ssh2
Jul  5 03:40:09 NPSTNNYC01T sshd[1496]: Failed password for root from 112.85.42.237 port 61607 ssh2
Jul  5 03:40:11 NPSTNNYC01T sshd[1496]: Failed password for root from 112.85.42.237 port 61607 ssh2
...
2020-07-05 16:01:28
62.24.104.71 attackbotsspam
Jul  5 07:25:10 srv-ubuntu-dev3 sshd[65088]: Invalid user admin from 62.24.104.71
Jul  5 07:25:10 srv-ubuntu-dev3 sshd[65088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.24.104.71
Jul  5 07:25:10 srv-ubuntu-dev3 sshd[65088]: Invalid user admin from 62.24.104.71
Jul  5 07:25:12 srv-ubuntu-dev3 sshd[65088]: Failed password for invalid user admin from 62.24.104.71 port 39324 ssh2
Jul  5 07:29:11 srv-ubuntu-dev3 sshd[65693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.24.104.71  user=root
Jul  5 07:29:13 srv-ubuntu-dev3 sshd[65693]: Failed password for root from 62.24.104.71 port 36606 ssh2
Jul  5 07:32:56 srv-ubuntu-dev3 sshd[66366]: Invalid user b from 62.24.104.71
Jul  5 07:32:56 srv-ubuntu-dev3 sshd[66366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.24.104.71
Jul  5 07:32:56 srv-ubuntu-dev3 sshd[66366]: Invalid user b from 62.24.104.71
Jul  5 07
...
2020-07-05 16:19:40
206.189.155.76 attackbotsspam
jannisjulius.de 206.189.155.76 [05/Jul/2020:05:52:31 +0200] "POST /wp-login.php HTTP/1.1" 200 6358 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
jannisjulius.de 206.189.155.76 [05/Jul/2020:05:52:32 +0200] "POST /wp-login.php HTTP/1.1" 200 6318 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-07-05 16:03:40
125.141.56.117 attack
Fail2Ban Ban Triggered (2)
2020-07-05 15:46:18
52.187.19.52 attackbots
SSH Brute-Force. Ports scanning.
2020-07-05 16:18:35
101.89.110.204 attackbotsspam
$f2bV_matches
2020-07-05 15:45:28
118.89.69.159 attackspambots
Repeated brute force against a port
2020-07-05 16:16:54
122.51.222.42 attackbots
$f2bV_matches
2020-07-05 16:20:40
206.189.24.6 attackspam
206.189.24.6 - - [05/Jul/2020:08:17:22 +0100] "POST /wp-login.php HTTP/1.1" 200 2040 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
206.189.24.6 - - [05/Jul/2020:08:17:23 +0100] "POST /wp-login.php HTTP/1.1" 200 2037 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
206.189.24.6 - - [05/Jul/2020:08:17:23 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-05 15:49:44

Recently Reported IPs

175.107.192.194 104.248.194.119 194.187.249.61 185.234.216.189
103.59.200.58 118.193.31.179 185.53.91.50 159.65.106.35
162.243.145.33 109.98.71.230 24.155.189.235 41.235.53.192
118.25.138.95 123.206.219.211 23.95.113.42 164.132.196.98
103.218.135.176 14.177.250.213 167.62.25.186 193.169.254.68