Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.66.67.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32252
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.66.67.118.			IN	A

;; AUTHORITY SECTION:
.			176	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031301 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 14 05:53:09 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 118.67.66.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 118.67.66.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
121.157.82.170 attackbots
Jul 19 08:02:41 localhost sshd\[4616\]: Invalid user eddie from 121.157.82.170 port 52432
Jul 19 08:02:41 localhost sshd\[4616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.157.82.170
Jul 19 08:02:44 localhost sshd\[4616\]: Failed password for invalid user eddie from 121.157.82.170 port 52432 ssh2
2019-07-19 14:14:29
165.227.1.117 attack
Jul 19 08:02:48 localhost sshd\[4650\]: Invalid user iredadmin from 165.227.1.117 port 44540
Jul 19 08:02:48 localhost sshd\[4650\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.1.117
Jul 19 08:02:50 localhost sshd\[4650\]: Failed password for invalid user iredadmin from 165.227.1.117 port 44540 ssh2
2019-07-19 14:09:52
159.89.182.194 attackspambots
Jul 19 07:39:13 legacy sshd[23226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.182.194
Jul 19 07:39:15 legacy sshd[23226]: Failed password for invalid user wang from 159.89.182.194 port 51892 ssh2
Jul 19 07:45:33 legacy sshd[23477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.182.194
...
2019-07-19 13:46:09
70.49.236.26 attack
Jul 19 01:58:11 TORMINT sshd\[27031\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.49.236.26  user=root
Jul 19 01:58:13 TORMINT sshd\[27031\]: Failed password for root from 70.49.236.26 port 56316 ssh2
Jul 19 02:02:53 TORMINT sshd\[27265\]: Invalid user yong from 70.49.236.26
Jul 19 02:02:53 TORMINT sshd\[27265\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.49.236.26
...
2019-07-19 14:09:03
145.239.91.88 attackbotsspam
Jul 19 07:18:48 SilenceServices sshd[12821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.91.88
Jul 19 07:18:49 SilenceServices sshd[12821]: Failed password for invalid user andrey from 145.239.91.88 port 56140 ssh2
Jul 19 07:23:22 SilenceServices sshd[15914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.91.88
2019-07-19 13:46:34
91.140.226.227 attackbots
Unauthorized connection attempt from IP address 91.140.226.227 on Port 445(SMB)
2019-07-19 14:33:37
2a02:85f:1237:d500:4cb7:8fcd:7542:2cdb attackspam
C1,WP GET /nelson/wp-login.php
2019-07-19 14:06:55
203.83.183.11 attackbots
proto=tcp  .  spt=48706  .  dpt=25  .     (listed on Alienvault Jul 19)     (74)
2019-07-19 13:42:47
200.61.186.53 attackbotsspam
Unauthorized connection attempt from IP address 200.61.186.53 on Port 445(SMB)
2019-07-19 14:23:27
125.163.171.112 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-19 04:37:52,762 INFO [amun_request_handler] PortScan Detected on Port: 445 (125.163.171.112)
2019-07-19 14:13:12
202.77.122.67 attackbots
Unauthorized connection attempt from IP address 202.77.122.67 on Port 445(SMB)
2019-07-19 14:26:29
61.191.50.169 attackbots
Unauthorized connection attempt from IP address 61.191.50.169 on Port 445(SMB)
2019-07-19 14:12:22
86.188.246.2 attackbotsspam
Jul 19 07:48:29 vps691689 sshd[24856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.188.246.2
Jul 19 07:48:31 vps691689 sshd[24856]: Failed password for invalid user admin from 86.188.246.2 port 59786 ssh2
...
2019-07-19 14:02:43
61.220.204.182 attackspambots
Unauthorized connection attempt from IP address 61.220.204.182 on Port 445(SMB)
2019-07-19 14:34:32
104.236.244.98 attackspambots
Jul 19 02:16:10 vps200512 sshd\[24171\]: Invalid user chris from 104.236.244.98
Jul 19 02:16:10 vps200512 sshd\[24171\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.244.98
Jul 19 02:16:11 vps200512 sshd\[24171\]: Failed password for invalid user chris from 104.236.244.98 port 48464 ssh2
Jul 19 02:23:04 vps200512 sshd\[24283\]: Invalid user rachid from 104.236.244.98
Jul 19 02:23:04 vps200512 sshd\[24283\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.244.98
2019-07-19 14:28:00

Recently Reported IPs

172.101.73.92 81.162.97.88 66.86.34.174 100.15.92.168
73.45.36.146 26.180.91.88 106.48.205.207 203.70.209.171
198.224.30.91 38.233.50.0 219.24.213.177 185.41.6.154
53.154.110.185 61.194.74.79 202.96.114.193 244.216.76.20
88.72.186.161 176.85.120.39 59.248.24.167 17.1.185.207