Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Charleston

Region: Illinois

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.67.74.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34921
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.67.74.129.			IN	A

;; AUTHORITY SECTION:
.			417	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019092100 1800 900 604800 86400

;; Query time: 86 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 22 01:57:31 CST 2019
;; MSG SIZE  rcvd: 117

Host info
129.74.67.139.in-addr.arpa domain name pointer indiaone.fpmn74.eiu.edu.
Nslookup info:
Server:		10.38.0.1
Address:	10.38.0.1#53

Non-authoritative answer:
129.74.67.139.in-addr.arpa	name = indiaone.fpmn74.eiu.edu.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
193.169.39.254 attackspambots
Jan 23 04:52:38 firewall sshd[7381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.169.39.254
Jan 23 04:52:38 firewall sshd[7381]: Invalid user mar from 193.169.39.254
Jan 23 04:52:40 firewall sshd[7381]: Failed password for invalid user mar from 193.169.39.254 port 43558 ssh2
...
2020-01-23 16:33:44
104.43.138.105 attackbots
"SSH brute force auth login attempt."
2020-01-23 16:24:35
121.78.129.147 attackspam
Unauthorized connection attempt detected from IP address 121.78.129.147 to port 2220 [J]
2020-01-23 16:52:02
207.154.239.128 attackspam
Invalid user testuser from 207.154.239.128 port 41094
2020-01-23 16:18:04
213.141.22.34 attackspam
"SSH brute force auth login attempt."
2020-01-23 16:26:29
118.143.214.116 attack
"SSH brute force auth login attempt."
2020-01-23 16:50:11
103.1.209.245 attackspambots
Unauthorized connection attempt detected from IP address 103.1.209.245 to port 2220 [J]
2020-01-23 16:12:06
140.143.151.93 attackspam
Unauthorized connection attempt detected from IP address 140.143.151.93 to port 2220 [J]
2020-01-23 16:49:30
148.70.24.20 attackspambots
"SSH brute force auth login attempt."
2020-01-23 16:17:39
144.217.164.70 attack
"SSH brute force auth login attempt."
2020-01-23 16:38:45
204.135.12.100 attackbotsspam
Exploit Attempt
2020-01-23 16:38:27
106.13.22.60 attack
2020-01-23T08:44:20.758498shield sshd\[24555\]: Invalid user admin from 106.13.22.60 port 53432
2020-01-23T08:44:20.767297shield sshd\[24555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.22.60
2020-01-23T08:44:23.055447shield sshd\[24555\]: Failed password for invalid user admin from 106.13.22.60 port 53432 ssh2
2020-01-23T08:46:36.148636shield sshd\[24969\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.22.60  user=root
2020-01-23T08:46:38.104670shield sshd\[24969\]: Failed password for root from 106.13.22.60 port 43702 ssh2
2020-01-23 16:52:55
89.36.220.145 attackbotsspam
"SSH brute force auth login attempt."
2020-01-23 16:41:23
211.72.239.243 attackspam
Unauthorized connection attempt detected from IP address 211.72.239.243 to port 2220 [J]
2020-01-23 16:24:10
118.25.36.79 attackspam
"SSH brute force auth login attempt."
2020-01-23 16:53:10

Recently Reported IPs

106.123.74.162 199.76.38.81 164.90.33.73 160.217.232.234
85.128.7.162 194.116.252.113 208.63.104.179 36.28.29.122
97.165.36.175 102.163.235.180 115.213.152.121 57.91.64.205
64.108.132.79 90.85.254.199 179.222.14.59 119.28.24.83
56.99.9.112 119.88.193.17 24.183.108.177 58.184.113.85