Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: New Zealand

Internet Service Provider: unknown

Hostname: unknown

Organization: The University of Otago

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.80.196.154
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44577
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.80.196.154.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019042401 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Thu Apr 25 02:32:58 +08 2019
;; MSG SIZE  rcvd: 118

Host info
Host 154.196.80.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 154.196.80.139.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
139.199.26.219 attackspambots
2020-06-13T05:23:14.580070server.espacesoutien.com sshd[11566]: Invalid user costel from 139.199.26.219 port 59728
2020-06-13T05:23:14.595183server.espacesoutien.com sshd[11566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.26.219
2020-06-13T05:23:14.580070server.espacesoutien.com sshd[11566]: Invalid user costel from 139.199.26.219 port 59728
2020-06-13T05:23:16.654096server.espacesoutien.com sshd[11566]: Failed password for invalid user costel from 139.199.26.219 port 59728 ssh2
...
2020-06-13 14:05:42
212.64.66.135 attackspambots
2020-06-13T08:18:59.926894mail.standpoint.com.ua sshd[9043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.66.135
2020-06-13T08:18:59.924100mail.standpoint.com.ua sshd[9043]: Invalid user lincaojiong from 212.64.66.135 port 55610
2020-06-13T08:19:01.645884mail.standpoint.com.ua sshd[9043]: Failed password for invalid user lincaojiong from 212.64.66.135 port 55610 ssh2
2020-06-13T08:22:46.460616mail.standpoint.com.ua sshd[9559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.66.135  user=root
2020-06-13T08:22:48.009828mail.standpoint.com.ua sshd[9559]: Failed password for root from 212.64.66.135 port 45010 ssh2
...
2020-06-13 13:48:12
124.156.132.183 attackbots
Jun 13 05:12:08 scw-6657dc sshd[18580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.132.183
Jun 13 05:12:08 scw-6657dc sshd[18580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.132.183
Jun 13 05:12:09 scw-6657dc sshd[18580]: Failed password for invalid user admin from 124.156.132.183 port 55872 ssh2
...
2020-06-13 13:30:21
106.12.153.31 attackbots
Jun 12 19:13:34 php1 sshd\[22256\]: Invalid user ftpuser from 106.12.153.31
Jun 12 19:13:34 php1 sshd\[22256\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.153.31
Jun 12 19:13:36 php1 sshd\[22256\]: Failed password for invalid user ftpuser from 106.12.153.31 port 50580 ssh2
Jun 12 19:17:40 php1 sshd\[22596\]: Invalid user ali from 106.12.153.31
Jun 12 19:17:40 php1 sshd\[22596\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.153.31
2020-06-13 13:28:14
195.81.64.102 attackspambots
Trying ports that it shouldn't be.
2020-06-13 13:44:13
218.92.0.145 attack
Jun 13 07:40:31 sso sshd[31610]: Failed password for root from 218.92.0.145 port 51266 ssh2
Jun 13 07:40:34 sso sshd[31610]: Failed password for root from 218.92.0.145 port 51266 ssh2
...
2020-06-13 13:50:54
36.67.4.237 attackbots
1592021413 - 06/13/2020 06:10:13 Host: 36.67.4.237/36.67.4.237 Port: 445 TCP Blocked
2020-06-13 13:51:27
111.231.142.160 attackbots
Jun 13 06:11:35 ns382633 sshd\[31913\]: Invalid user yuanwd from 111.231.142.160 port 57698
Jun 13 06:11:35 ns382633 sshd\[31913\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.142.160
Jun 13 06:11:36 ns382633 sshd\[31913\]: Failed password for invalid user yuanwd from 111.231.142.160 port 57698 ssh2
Jun 13 06:37:28 ns382633 sshd\[4904\]: Invalid user td from 111.231.142.160 port 38926
Jun 13 06:37:28 ns382633 sshd\[4904\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.142.160
2020-06-13 13:44:49
139.199.59.31 attackspam
Jun 13 07:24:02 h2779839 sshd[25396]: Invalid user ismael from 139.199.59.31 port 20800
Jun 13 07:24:02 h2779839 sshd[25396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.59.31
Jun 13 07:24:02 h2779839 sshd[25396]: Invalid user ismael from 139.199.59.31 port 20800
Jun 13 07:24:03 h2779839 sshd[25396]: Failed password for invalid user ismael from 139.199.59.31 port 20800 ssh2
Jun 13 07:28:36 h2779839 sshd[25474]: Invalid user pete from 139.199.59.31 port 12333
Jun 13 07:28:36 h2779839 sshd[25474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.59.31
Jun 13 07:28:36 h2779839 sshd[25474]: Invalid user pete from 139.199.59.31 port 12333
Jun 13 07:28:39 h2779839 sshd[25474]: Failed password for invalid user pete from 139.199.59.31 port 12333 ssh2
Jun 13 07:33:05 h2779839 sshd[25551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.59.31  user=ro
...
2020-06-13 13:49:36
198.50.177.42 attackbotsspam
Jun 13 06:07:54 ns382633 sshd\[30995\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.50.177.42  user=root
Jun 13 06:07:57 ns382633 sshd\[30995\]: Failed password for root from 198.50.177.42 port 36354 ssh2
Jun 13 06:10:25 ns382633 sshd\[31765\]: Invalid user lqq from 198.50.177.42 port 57962
Jun 13 06:10:25 ns382633 sshd\[31765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.50.177.42
Jun 13 06:10:27 ns382633 sshd\[31765\]: Failed password for invalid user lqq from 198.50.177.42 port 57962 ssh2
2020-06-13 13:40:32
14.170.170.42 attackbots
1592021411 - 06/13/2020 06:10:11 Host: 14.170.170.42/14.170.170.42 Port: 445 TCP Blocked
2020-06-13 13:54:40
200.108.143.6 attack
Jun 13 06:15:40 ns382633 sshd\[32688\]: Invalid user klim from 200.108.143.6 port 37478
Jun 13 06:15:40 ns382633 sshd\[32688\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.108.143.6
Jun 13 06:15:42 ns382633 sshd\[32688\]: Failed password for invalid user klim from 200.108.143.6 port 37478 ssh2
Jun 13 06:24:46 ns382633 sshd\[1590\]: Invalid user testmail from 200.108.143.6 port 32990
Jun 13 06:24:46 ns382633 sshd\[1590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.108.143.6
2020-06-13 13:53:20
46.101.128.31 attack
 TCP (SYN) 46.101.128.31:49373 -> port 8080, len 44
2020-06-13 14:05:11
112.170.87.205 attackbots
20/6/13@00:10:15: FAIL: Alarm-Telnet address from=112.170.87.205
...
2020-06-13 13:50:08
117.50.23.52 attack
firewall-block, port(s): 102/tcp
2020-06-13 13:59:41

Recently Reported IPs

82.150.208.48 27.71.209.12 116.58.7.221 79.20.191.246
197.62.221.4 197.58.105.130 39.234.46.40 186.159.2.57
109.122.59.228 181.57.144.66 27.110.4.30 191.241.242.22
5.9.98.234 77.247.109.96 93.174.93.102 51.38.179.143
187.11.135.205 60.251.53.226 38.113.184.1 78.235.194.238