Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.61.130.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14731
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.61.130.66.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 18:50:05 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 66.130.61.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.130.61.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.69.153.247 attackbots
Aug  7 08:26:55 meumeu sshd[31964]: Failed password for invalid user paps from 185.69.153.247 port 49788 ssh2
Aug  7 08:31:38 meumeu sshd[32485]: Failed password for invalid user bai from 185.69.153.247 port 46762 ssh2
...
2019-08-07 14:37:51
103.17.159.54 attackspambots
<6 unauthorized SSH connections
2019-08-07 15:13:55
213.229.102.147 attackbotsspam
firewall-block, port(s): 445/tcp
2019-08-07 14:58:34
112.85.42.237 attackbotsspam
Aug  7 02:03:37 aat-srv002 sshd[2404]: Failed password for root from 112.85.42.237 port 43572 ssh2
Aug  7 02:20:52 aat-srv002 sshd[2656]: Failed password for root from 112.85.42.237 port 56178 ssh2
Aug  7 02:22:32 aat-srv002 sshd[2690]: Failed password for root from 112.85.42.237 port 61781 ssh2
...
2019-08-07 15:35:35
134.175.111.215 attackbots
Aug  7 02:15:27 root sshd[1548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.111.215 
Aug  7 02:15:29 root sshd[1548]: Failed password for invalid user tom from 134.175.111.215 port 47146 ssh2
Aug  7 02:20:17 root sshd[1580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.111.215 
...
2019-08-07 14:55:05
157.230.255.16 attackbots
Aug  7 09:26:38 yabzik sshd[1733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.255.16
Aug  7 09:26:41 yabzik sshd[1733]: Failed password for invalid user www from 157.230.255.16 port 47736 ssh2
Aug  7 09:31:54 yabzik sshd[3667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.255.16
2019-08-07 14:35:46
110.242.151.47 attackspambots
Unauthorised access (Aug  7) SRC=110.242.151.47 LEN=40 TTL=49 ID=20539 TCP DPT=8080 WINDOW=12072 SYN
2019-08-07 15:24:29
178.62.181.74 attack
Aug  7 03:01:22 vps200512 sshd\[3757\]: Invalid user minecraft from 178.62.181.74
Aug  7 03:01:22 vps200512 sshd\[3757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.181.74
Aug  7 03:01:24 vps200512 sshd\[3757\]: Failed password for invalid user minecraft from 178.62.181.74 port 33125 ssh2
Aug  7 03:05:40 vps200512 sshd\[3838\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.181.74  user=man
Aug  7 03:05:42 vps200512 sshd\[3838\]: Failed password for man from 178.62.181.74 port 55720 ssh2
2019-08-07 15:16:48
88.15.245.185 attack
Aug  7 07:51:27 * sshd[25772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.15.245.185
Aug  7 07:51:29 * sshd[25772]: Failed password for invalid user harold from 88.15.245.185 port 44492 ssh2
2019-08-07 14:46:26
45.181.31.186 attackspambots
Automatic report - Port Scan Attack
2019-08-07 15:22:22
210.176.100.37 attack
B: zzZZzz blocked content access
2019-08-07 14:58:05
131.221.96.128 attack
port scan and connect, tcp 23 (telnet)
2019-08-07 15:26:21
103.125.189.122 attackbotsspam
>6 unauthorized SSH connections
2019-08-07 15:33:40
144.217.89.55 attackbots
<6 unauthorized SSH connections
2019-08-07 15:25:43
1.190.162.215 attack
Aug  6 21:32:47   DDOS Attack: SRC=1.190.162.215 DST=[Masked] LEN=40 TOS=0x00 PREC=0x00 TTL=48  DF PROTO=TCP SPT=28608 DPT=80 WINDOW=0 RES=0x00 RST URGP=0
2019-08-07 15:02:40

Recently Reported IPs

189.122.8.9 243.235.172.156 230.68.30.97 221.160.57.51
187.197.220.186 162.134.219.85 101.4.57.253 203.233.11.115
201.180.142.215 71.149.69.3 166.59.154.47 211.12.44.172
164.126.184.9 159.251.99.195 82.35.103.193 187.80.89.116
140.58.21.176 227.15.237.230 4.35.159.70 25.204.170.45