Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
139.5.223.47 attack
Automatic report - XMLRPC Attack
2019-11-02 03:01:02
139.5.223.41 attack
19/9/20@14:18:13: FAIL: IoT-Telnet address from=139.5.223.41
...
2019-09-21 05:52:15
139.5.223.137 attackbots
Request: "GET / HTTP/1.1"
2019-06-22 12:35:24
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.5.223.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24447
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.5.223.138.			IN	A

;; AUTHORITY SECTION:
.			58	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:32:15 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 138.223.5.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.223.5.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.202.4.2 attackbots
Triggered by Fail2Ban at Ares web server
2020-08-26 23:46:55
154.160.6.67 attackspambots
Wordpress attack
2020-08-26 23:57:47
92.63.196.33 attackspam
ET DROP Dshield Block Listed Source group 1 - port: 3391 proto: tcp cat: Misc Attackbytes: 60
2020-08-27 00:16:27
193.27.228.157 attackbotsspam
scans 20 times in preceeding hours on the ports (in chronological order) 2075 1913 1742 1216 1688 1843 1575 1497 1546 1630 1213 2046 2038 2389 1103 1821 1542 1112 2176 2321
2020-08-26 23:55:56
45.129.33.60 attackbotsspam
SmallBizIT.US 8 packets to tcp(41171,41188,41220,41234,41267,41271,41276,41289)
2020-08-27 00:24:55
196.52.43.57 attack
" "
2020-08-26 23:47:27
46.161.27.75 attackbotsspam
 TCP (SYN) 46.161.27.75:47461 -> port 2257, len 44
2020-08-27 00:22:17
128.199.4.81 attackspambots
scans 2 times in preceeding hours on the ports (in chronological order) 8088 8088
2020-08-27 00:00:29
62.171.163.94 attackspambots
scans 8 times in preceeding hours on the ports (in chronological order) 1093 1094 1095 1096 1097 1098 1099 1100
2020-08-27 00:05:35
62.234.156.221 attackbotsspam
2020-08-26T17:36:43.165084lavrinenko.info sshd[659]: Invalid user sharks from 62.234.156.221 port 58732
2020-08-26T17:36:43.172057lavrinenko.info sshd[659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.156.221
2020-08-26T17:36:43.165084lavrinenko.info sshd[659]: Invalid user sharks from 62.234.156.221 port 58732
2020-08-26T17:36:45.508975lavrinenko.info sshd[659]: Failed password for invalid user sharks from 62.234.156.221 port 58732 ssh2
2020-08-26T17:40:25.274424lavrinenko.info sshd[746]: Invalid user token from 62.234.156.221 port 40108
...
2020-08-26 23:49:02
139.99.120.194 attackspam
scans 35 times in preceeding hours on the ports (in chronological order) 2006 2007 2008 2009 2010 2010 2012 2013 2014 2015 2016 2017 2018 2021 2026 2027 2028 2029 2030 2031 2032 2010 2034 2035 2036 2037 2038 2039 2040 2041 2042 2043 2044 2045 2046
2020-08-26 23:59:05
111.202.4.3 attackbotsspam
Triggered by Fail2Ban at Ares web server
2020-08-26 23:45:36
106.13.167.77 attackspam
2020-08-26T17:27:09.632158amanda2.illicoweb.com sshd\[12742\]: Invalid user ubuntu from 106.13.167.77 port 45188
2020-08-26T17:27:09.637619amanda2.illicoweb.com sshd\[12742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.167.77
2020-08-26T17:27:11.722018amanda2.illicoweb.com sshd\[12742\]: Failed password for invalid user ubuntu from 106.13.167.77 port 45188 ssh2
2020-08-26T17:30:30.010049amanda2.illicoweb.com sshd\[12909\]: Invalid user ts3 from 106.13.167.77 port 40462
2020-08-26T17:30:30.016932amanda2.illicoweb.com sshd\[12909\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.167.77
...
2020-08-27 00:01:28
195.54.167.92 attack
SmallBizIT.US 9 packets to tcp(11989,11993,11994,11996,11998,12080,12084,12090,12094)
2020-08-27 00:30:16
45.129.33.152 attackspam
SmallBizIT.US 7 packets to tcp(30209,30221,30252,30260,30280,30285,30300)
2020-08-27 00:23:59

Recently Reported IPs

139.5.223.135 139.5.223.144 139.5.223.133 118.254.141.134
139.5.223.146 139.5.223.128 139.5.223.149 139.5.223.150
139.5.223.164 139.5.223.155 139.5.223.162 139.5.223.16
139.5.223.157 139.5.223.172 139.5.223.166 139.5.223.182
118.254.141.136 139.5.223.176 139.5.223.194 139.5.223.197