Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 153.139.241.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37094
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;153.139.241.169.		IN	A

;; AUTHORITY SECTION:
.			561	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 04:48:40 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 169.241.139.153.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 169.241.139.153.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
171.240.152.88 attackbots
SSH bruteforce
2020-06-03 17:40:14
173.244.209.5 attackbots
US_Hosting_<177>1591173490 [1:2522026:4082] ET TOR Known Tor Relay/Router (Not Exit) Node TCP Traffic group 27 [Classification: Misc Attack] [Priority: 2]:  {TCP} 173.244.209.5:55714
2020-06-03 17:32:55
76.30.215.237 attackspam
Port Scan detected!
...
2020-06-03 17:44:41
129.211.85.214 attackspam
Jun  3 06:51:38 minden010 sshd[2894]: Failed password for root from 129.211.85.214 port 44092 ssh2
Jun  3 06:53:51 minden010 sshd[3738]: Failed password for root from 129.211.85.214 port 39686 ssh2
...
2020-06-03 17:26:30
117.131.60.59 attack
2020-06-03T02:07:02.847180linuxbox-skyline sshd[104897]: Invalid user alpha1\r from 117.131.60.59 port 33048
...
2020-06-03 17:44:07
14.160.70.178 attackbots
Dovecot Invalid User Login Attempt.
2020-06-03 17:42:17
51.255.173.222 attackspam
fail2ban/Jun  3 11:07:57 h1962932 sshd[8507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.ip-51-255-173.eu  user=root
Jun  3 11:08:00 h1962932 sshd[8507]: Failed password for root from 51.255.173.222 port 42458 ssh2
Jun  3 11:11:45 h1962932 sshd[8616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.ip-51-255-173.eu  user=root
Jun  3 11:11:47 h1962932 sshd[8616]: Failed password for root from 51.255.173.222 port 48344 ssh2
Jun  3 11:15:18 h1962932 sshd[8736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.ip-51-255-173.eu  user=root
Jun  3 11:15:20 h1962932 sshd[8736]: Failed password for root from 51.255.173.222 port 54204 ssh2
2020-06-03 17:35:58
139.59.169.84 attackspambots
Automatic report - XMLRPC Attack
2020-06-03 17:35:07
2.110.91.132 attackspambots
Honeypot hit.
2020-06-03 17:07:27
114.237.109.81 attack
$f2bV_matches
2020-06-03 17:13:02
134.209.226.157 attack
Bruteforce detected by fail2ban
2020-06-03 17:41:46
222.244.246.204 attackspambots
Honeypot hit.
2020-06-03 17:32:42
117.48.227.152 attackspam
Tried sshing with brute force.
2020-06-03 17:18:02
123.206.216.65 attack
Jun  3 08:28:35 xeon sshd[12183]: Failed password for root from 123.206.216.65 port 43274 ssh2
2020-06-03 17:12:36
183.134.91.158 attackbots
Triggered by Fail2Ban at Ares web server
2020-06-03 17:39:49

Recently Reported IPs

153.142.215.242 153.149.101.108 153.149.101.118 153.149.100.117
153.139.234.138 153.149.100.5 153.142.233.184 153.149.101.91
153.143.226.141 153.149.105.245 153.149.179.103 153.149.106.147
153.149.177.247 153.19.105.20 153.19.170.6 153.2.230.100
153.179.5.15 153.2.226.100 153.19.72.41 153.92.10.105