Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.200.139.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34889
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;169.200.139.136.		IN	A

;; AUTHORITY SECTION:
.			161	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 17:16:17 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 136.139.200.169.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 136.139.200.169.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.88.112.111 attackspambots
Sep 25 04:55:56 monocul sshd[564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.111  user=root
Sep 25 04:55:58 monocul sshd[564]: Failed password for root from 49.88.112.111 port 55288 ssh2
...
2019-09-25 14:36:34
157.230.140.180 attackspambots
2019-09-25T00:43:55.5438651495-001 sshd\[24013\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.140.180
2019-09-25T00:43:57.3723021495-001 sshd\[24013\]: Failed password for invalid user ubnt from 157.230.140.180 port 38926 ssh2
2019-09-25T00:55:53.3653901495-001 sshd\[24839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.140.180  user=operator
2019-09-25T00:55:56.0985351495-001 sshd\[24839\]: Failed password for operator from 157.230.140.180 port 49698 ssh2
2019-09-25T01:07:51.4436401495-001 sshd\[25735\]: Invalid user csilla from 157.230.140.180 port 60500
2019-09-25T01:07:51.4534941495-001 sshd\[25735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.140.180
...
2019-09-25 14:57:20
160.119.126.42 attackspambots
Automatic report - Port Scan Attack
2019-09-25 14:50:26
108.179.219.114 attackspambots
www.lust-auf-land.com 108.179.219.114 \[25/Sep/2019:05:53:19 +0200\] "POST /wp-login.php HTTP/1.1" 200 5828 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
www.lust-auf-land.com 108.179.219.114 \[25/Sep/2019:05:53:21 +0200\] "POST /wp-login.php HTTP/1.1" 200 5787 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-09-25 14:45:33
211.97.19.8 attack
Unauthorised access (Sep 25) SRC=211.97.19.8 LEN=40 TTL=49 ID=1438 TCP DPT=8080 WINDOW=14996 SYN
2019-09-25 14:54:41
122.225.200.114 attackbotsspam
Sep 25 02:49:32 web1 postfix/smtpd[26065]: warning: unknown[122.225.200.114]: SASL LOGIN authentication failed: authentication failure
...
2019-09-25 14:53:54
202.254.234.142 attackbotsspam
Scanning and Vuln Attempts
2019-09-25 14:47:35
125.45.90.28 attackbotsspam
Sep 23 07:20:33 ACSRAD auth.info sshd[21951]: Invalid user kc from 125.45.90.28 port 39048
Sep 23 07:20:33 ACSRAD auth.info sshd[21951]: Failed password for invalid user kc from 125.45.90.28 port 39048 ssh2
Sep 23 07:20:34 ACSRAD auth.info sshd[21951]: Received disconnect from 125.45.90.28 port 39048:11: Bye Bye [preauth]
Sep 23 07:20:34 ACSRAD auth.info sshd[21951]: Disconnected from 125.45.90.28 port 39048 [preauth]
Sep 23 07:20:34 ACSRAD auth.notice sshguard[30767]: Attack from "125.45.90.28" on service 100 whostnameh danger 10.
Sep 23 07:20:34 ACSRAD auth.notice sshguard[30767]: Attack from "125.45.90.28" on service 100 whostnameh danger 10.
Sep 23 07:20:34 ACSRAD auth.notice sshguard[30767]: Attack from "125.45.90.28" on service 100 whostnameh danger 10.
Sep 23 07:20:34 ACSRAD auth.warn sshguard[30767]: Blocking "125.45.90.28/32" for 120 secs (3 attacks in 0 secs, after 1 abuses over 0 secs.)
Sep 23 07:25:13 ACSRAD auth.info sshd[24533]: Invalid user loverd from 125........
------------------------------
2019-09-25 14:49:07
222.186.175.217 attack
Sep 25 08:17:07 root sshd[16669]: Failed password for root from 222.186.175.217 port 37226 ssh2
Sep 25 08:17:12 root sshd[16669]: Failed password for root from 222.186.175.217 port 37226 ssh2
Sep 25 08:17:17 root sshd[16669]: Failed password for root from 222.186.175.217 port 37226 ssh2
Sep 25 08:17:21 root sshd[16669]: Failed password for root from 222.186.175.217 port 37226 ssh2
...
2019-09-25 14:44:15
222.186.175.148 attackbots
v+ssh-bruteforce
2019-09-25 14:47:00
91.206.14.250 attackspambots
RDP brute force attack detected by fail2ban
2019-09-25 15:00:48
188.254.0.182 attack
Sep 25 06:49:29 mail1 sshd\[17241\]: Invalid user benny from 188.254.0.182 port 58704
Sep 25 06:49:29 mail1 sshd\[17241\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.182
Sep 25 06:49:32 mail1 sshd\[17241\]: Failed password for invalid user benny from 188.254.0.182 port 58704 ssh2
Sep 25 07:07:15 mail1 sshd\[25649\]: Invalid user drive from 188.254.0.182 port 56050
Sep 25 07:07:15 mail1 sshd\[25649\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.182
...
2019-09-25 15:01:28
106.13.46.114 attackbotsspam
Sep 25 07:06:47 www1 sshd\[1860\]: Invalid user tms from 106.13.46.114Sep 25 07:06:49 www1 sshd\[1860\]: Failed password for invalid user tms from 106.13.46.114 port 49124 ssh2Sep 25 07:10:14 www1 sshd\[2322\]: Invalid user oracle from 106.13.46.114Sep 25 07:10:16 www1 sshd\[2322\]: Failed password for invalid user oracle from 106.13.46.114 port 46572 ssh2Sep 25 07:13:43 www1 sshd\[2616\]: Invalid user hadoop from 106.13.46.114Sep 25 07:13:45 www1 sshd\[2616\]: Failed password for invalid user hadoop from 106.13.46.114 port 44024 ssh2
...
2019-09-25 14:36:09
197.85.7.159 attackbotsspam
Scanning and Vuln Attempts
2019-09-25 15:11:42
49.83.1.110 attackspam
Sep 25 07:22:53 nginx sshd[51700]: error: maximum authentication attempts exceeded for root from 49.83.1.110 port 44765 ssh2 [preauth]
Sep 25 07:22:53 nginx sshd[51700]: Disconnecting: Too many authentication failures [preauth]
2019-09-25 15:11:26

Recently Reported IPs

187.11.206.169 96.39.208.28 53.143.132.197 27.109.187.118
186.1.240.206 106.123.171.5 150.192.63.34 222.22.187.3
81.200.16.124 222.78.109.218 206.5.93.89 236.29.178.217
153.63.253.44 35.40.70.91 114.84.203.16 224.121.36.219
244.173.90.148 243.149.108.4 158.76.250.126 73.141.33.121