Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.19.167.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58118
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;149.19.167.139.			IN	A

;; AUTHORITY SECTION:
.			564	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019103000 1800 900 604800 86400

;; Query time: 104 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 30 21:23:58 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 139.167.19.149.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 139.167.19.149.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
222.121.123.117 attack
1582103258 - 02/19/2020 10:07:38 Host: 222.121.123.117/222.121.123.117 Port: 23 TCP Blocked
2020-02-19 18:45:36
120.29.75.64 attackbots
unauthorized connection attempt
2020-02-19 18:23:50
84.217.24.243 attack
unauthorized connection attempt
2020-02-19 18:14:24
116.105.91.145 attackspam
port scan and connect, tcp 23 (telnet)
2020-02-19 18:53:03
114.32.130.203 attackbotsspam
unauthorized connection attempt
2020-02-19 18:54:28
35.228.162.115 attackbotsspam
C1,WP GET /suche/blog/wp-login.php
2020-02-19 18:27:27
82.102.173.78 attackspam
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2020-02-19 18:14:55
177.104.89.191 attackspam
Honeypot attack, port: 81, PTR: power177-104-89-191.powerline.com.br.
2020-02-19 18:36:44
45.148.10.180 attack
45.148.10.180 was recorded 7 times by 7 hosts attempting to connect to the following ports: 123. Incident counter (4h, 24h, all-time): 7, 8, 92
2020-02-19 18:38:13
220.121.200.154 attackspambots
unauthorized connection attempt
2020-02-19 18:16:55
122.116.203.31 attackbots
unauthorized connection attempt
2020-02-19 18:51:09
183.54.210.115 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-02-19 18:40:35
182.53.193.241 attackbots
Fail2Ban Ban Triggered
2020-02-19 18:47:53
123.235.179.32 attackbotsspam
unauthorized connection attempt
2020-02-19 18:50:47
125.227.232.21 attack
Honeypot attack, port: 445, PTR: 125-227-232-21.HINET-IP.hinet.net.
2020-02-19 18:23:01

Recently Reported IPs

79.7.136.90 57.38.103.117 57.149.13.27 14.27.126.125
204.180.143.17 72.154.30.45 25.156.5.54 254.241.9.116
176.112.203.22 37.65.218.113 69.112.130.143 30.80.132.210
246.148.214.97 46.172.235.105 84.154.199.91 169.113.222.94
191.203.65.235 226.218.183.36 28.166.0.232 251.132.206.75