Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.82.74.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32676
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.82.74.131.			IN	A

;; AUTHORITY SECTION:
.			579	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 79 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:41:14 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 131.74.82.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 131.74.82.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
198.46.152.161 attack
Jul 13 12:54:22 onepixel sshd[238767]: Invalid user sanchit from 198.46.152.161 port 55944
Jul 13 12:54:22 onepixel sshd[238767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.46.152.161 
Jul 13 12:54:22 onepixel sshd[238767]: Invalid user sanchit from 198.46.152.161 port 55944
Jul 13 12:54:23 onepixel sshd[238767]: Failed password for invalid user sanchit from 198.46.152.161 port 55944 ssh2
Jul 13 12:57:05 onepixel sshd[240287]: Invalid user play from 198.46.152.161 port 39392
2020-07-13 21:04:52
145.239.92.26 attack
SSH auth scanning - multiple failed logins
2020-07-13 20:53:26
106.197.39.112 attackbotsspam
Email rejected due to spam filtering
2020-07-13 20:32:45
14.202.193.117 attackspam
14.202.193.117 - - [13/Jul/2020:15:07:19 +0200] "GET /wp-login.php HTTP/1.1" 200 1689 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
14.202.193.117 - - [13/Jul/2020:15:07:20 +0200] "POST /wp-login.php HTTP/1.1" 200 1811 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
14.202.193.117 - - [13/Jul/2020:15:07:21 +0200] "GET /wp-login.php HTTP/1.1" 200 1689 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
14.202.193.117 - - [13/Jul/2020:15:07:22 +0200] "POST /wp-login.php HTTP/1.1" 200 1799 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
14.202.193.117 - - [13/Jul/2020:15:07:22 +0200] "GET /wp-login.php HTTP/1.1" 200 1689 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
14.202.193.117 - - [13/Jul/2020:15:07:24 +0200] "POST /wp-login.php HTTP/1.1" 200 1798 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/201001
...
2020-07-13 21:12:20
87.98.218.97 attack
Jul 13 12:57:21 plex-server sshd[366459]: Invalid user linker from 87.98.218.97 port 43992
Jul 13 12:57:21 plex-server sshd[366459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.98.218.97 
Jul 13 12:57:21 plex-server sshd[366459]: Invalid user linker from 87.98.218.97 port 43992
Jul 13 12:57:23 plex-server sshd[366459]: Failed password for invalid user linker from 87.98.218.97 port 43992 ssh2
Jul 13 13:00:02 plex-server sshd[366863]: Invalid user beo from 87.98.218.97 port 38960
...
2020-07-13 21:00:58
91.240.118.64 attackbotsspam
07/13/2020-08:40:49.142161 91.240.118.64 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-07-13 20:49:58
2.29.27.247 attack
Email rejected due to spam filtering
2020-07-13 20:51:08
94.102.49.65 attack
POP3
2020-07-13 21:00:36
102.190.14.228 attackspambots
Email rejected due to spam filtering
2020-07-13 20:28:08
167.0.204.129 attackbots
Email rejected due to spam filtering
2020-07-13 21:00:11
185.211.246.110 attackspam
Jul  9 08:56:45 localhost postfix/smtpd[430909]: lost connection after CONNECT from unknown[185.211.246.110]
Jul  9 08:58:40 localhost postfix/smtpd[432874]: lost connection after CONNECT from unknown[185.211.246.110]
Jul  9 09:01:01 localhost postfix/smtpd[434227]: lost connection after CONNECT from unknown[185.211.246.110]
Jul  9 09:03:46 localhost postfix/smtpd[434075]: lost connection after CONNECT from unknown[185.211.246.110]
Jul  9 09:06:49 localhost postfix/smtpd[435699]: lost connection after CONNECT from unknown[185.211.246.110]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=185.211.246.110
2020-07-13 20:56:41
83.122.165.134 attackspam
Email rejected due to spam filtering
2020-07-13 20:29:06
129.211.157.209 attack
Jul 13 14:21:21 vps687878 sshd\[18910\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.157.209  user=debian
Jul 13 14:21:23 vps687878 sshd\[18910\]: Failed password for debian from 129.211.157.209 port 34474 ssh2
Jul 13 14:23:25 vps687878 sshd\[19175\]: Invalid user ftp01 from 129.211.157.209 port 52456
Jul 13 14:23:25 vps687878 sshd\[19175\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.157.209
Jul 13 14:23:26 vps687878 sshd\[19175\]: Failed password for invalid user ftp01 from 129.211.157.209 port 52456 ssh2
...
2020-07-13 20:28:22
115.133.237.161 attackspambots
$f2bV_matches
2020-07-13 20:53:54
167.172.163.162 attackspambots
Jul 13 12:25:32 plex-server sshd[361655]: Invalid user demo from 167.172.163.162 port 36368
Jul 13 12:25:32 plex-server sshd[361655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.163.162 
Jul 13 12:25:32 plex-server sshd[361655]: Invalid user demo from 167.172.163.162 port 36368
Jul 13 12:25:33 plex-server sshd[361655]: Failed password for invalid user demo from 167.172.163.162 port 36368 ssh2
Jul 13 12:28:13 plex-server sshd[362048]: Invalid user nexus from 167.172.163.162 port 33008
...
2020-07-13 20:31:05

Recently Reported IPs

139.9.0.105 139.9.105.186 118.254.209.108 139.9.125.180
139.9.135.23 139.9.113.234 139.9.133.196 139.9.135.101
139.9.139.220 139.9.135.41 139.9.141.41 139.9.137.176
139.9.143.80 139.9.146.20 139.9.141.190 139.9.160.80
118.254.209.110 139.9.141.48 139.9.153.153 139.9.161.209