Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 172.139.135.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43951
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;172.139.135.46.			IN	A

;; AUTHORITY SECTION:
.			553	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011001 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 04:51:15 CST 2022
;; MSG SIZE  rcvd: 107
Host info
b'Host 46.135.139.172.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 172.139.135.46.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
159.203.82.104 attackbotsspam
Jun 24 03:02:45 firewall sshd[7635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.82.104
Jun 24 03:02:45 firewall sshd[7635]: Invalid user zhangjie from 159.203.82.104
Jun 24 03:02:46 firewall sshd[7635]: Failed password for invalid user zhangjie from 159.203.82.104 port 56716 ssh2
...
2020-06-24 14:09:53
124.158.163.22 attackspambots
Jun 23 22:25:43 pi sshd[14460]: Failed password for root from 124.158.163.22 port 31945 ssh2
2020-06-24 14:14:08
41.111.133.103 attack
Jun 24 05:55:47 raspberrypi sshd[29449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.111.133.103 
Jun 24 05:55:49 raspberrypi sshd[29449]: Failed password for invalid user git from 41.111.133.103 port 59773 ssh2
...
2020-06-24 14:24:08
106.52.188.129 attackbotsspam
Jun 24 05:55:25 serwer sshd\[21809\]: Invalid user poseidon from 106.52.188.129 port 44296
Jun 24 05:55:25 serwer sshd\[21809\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.188.129
Jun 24 05:55:26 serwer sshd\[21809\]: Failed password for invalid user poseidon from 106.52.188.129 port 44296 ssh2
...
2020-06-24 14:40:45
83.239.99.22 attack
Unauthorized connection attempt: SRC=83.239.99.22
...
2020-06-24 14:07:17
13.125.200.249 attackbotsspam
Jun 24 08:40:07 b2b-pharm sshd[27225]: Invalid user test from 13.125.200.249 port 33410
Jun 24 08:40:07 b2b-pharm sshd[27225]: error: maximum authentication attempts exceeded for invalid user test from 13.125.200.249 port 33410 ssh2 [preauth]
Jun 24 08:40:07 b2b-pharm sshd[27225]: Invalid user test from 13.125.200.249 port 33410
Jun 24 08:40:07 b2b-pharm sshd[27225]: error: maximum authentication attempts exceeded for invalid user test from 13.125.200.249 port 33410 ssh2 [preauth]
Jun 24 08:40:07 b2b-pharm sshd[27225]: Invalid user test from 13.125.200.249 port 33410
Jun 24 08:40:07 b2b-pharm sshd[27225]: error: maximum authentication attempts exceeded for invalid user test from 13.125.200.249 port 33410 ssh2 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=13.125.200.249
2020-06-24 14:21:59
210.211.116.204 attackspam
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-06-24 14:21:14
196.52.43.88 attackbots
 TCP (SYN) 196.52.43.88:61749 -> port 80, len 44
2020-06-24 14:13:48
66.249.68.26 attack
MYH,DEF GET /_adminer/adminer.php
2020-06-24 14:04:37
61.151.130.22 attackbotsspam
Jun 24 05:55:25 mailserver sshd\[14768\]: Invalid user server from 61.151.130.22
...
2020-06-24 14:41:55
218.92.0.184 attackspam
Jun 24 00:18:12 debian sshd[8178]: Unable to negotiate with 218.92.0.184 port 19633: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth]
Jun 24 01:49:30 debian sshd[17260]: Unable to negotiate with 218.92.0.184 port 59041: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth]
...
2020-06-24 14:02:36
95.169.229.136 attack
Automatic report - XMLRPC Attack
2020-06-24 14:30:20
211.90.39.118 attackspam
Jun 24 07:09:37 ns392434 sshd[25382]: Invalid user a1 from 211.90.39.118 port 34365
Jun 24 07:09:37 ns392434 sshd[25382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.90.39.118
Jun 24 07:09:37 ns392434 sshd[25382]: Invalid user a1 from 211.90.39.118 port 34365
Jun 24 07:09:39 ns392434 sshd[25382]: Failed password for invalid user a1 from 211.90.39.118 port 34365 ssh2
Jun 24 07:22:34 ns392434 sshd[25628]: Invalid user ftp_user from 211.90.39.118 port 33077
Jun 24 07:22:34 ns392434 sshd[25628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.90.39.118
Jun 24 07:22:34 ns392434 sshd[25628]: Invalid user ftp_user from 211.90.39.118 port 33077
Jun 24 07:22:36 ns392434 sshd[25628]: Failed password for invalid user ftp_user from 211.90.39.118 port 33077 ssh2
Jun 24 07:24:20 ns392434 sshd[25676]: Invalid user marcelo from 211.90.39.118 port 40022
2020-06-24 14:37:24
59.172.6.244 attack
Jun 23 22:35:41 server1 sshd\[21739\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.172.6.244  user=root
Jun 23 22:35:43 server1 sshd\[21739\]: Failed password for root from 59.172.6.244 port 44960 ssh2
Jun 23 22:39:00 server1 sshd\[23967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.172.6.244  user=ubuntu
Jun 23 22:39:02 server1 sshd\[23967\]: Failed password for ubuntu from 59.172.6.244 port 38715 ssh2
Jun 23 22:42:22 server1 sshd\[26345\]: Invalid user esther from 59.172.6.244
Jun 23 22:42:22 server1 sshd\[26345\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.172.6.244 
Jun 23 22:42:24 server1 sshd\[26345\]: Failed password for invalid user esther from 59.172.6.244 port 60707 ssh2
...
2020-06-24 14:35:37
222.186.175.212 attackbotsspam
Jun 24 09:05:46 ift sshd\[49949\]: Failed password for root from 222.186.175.212 port 61396 ssh2Jun 24 09:05:58 ift sshd\[49949\]: Failed password for root from 222.186.175.212 port 61396 ssh2Jun 24 09:06:04 ift sshd\[50009\]: Failed password for root from 222.186.175.212 port 41062 ssh2Jun 24 09:06:13 ift sshd\[50009\]: Failed password for root from 222.186.175.212 port 41062 ssh2Jun 24 09:06:26 ift sshd\[50030\]: Failed password for root from 222.186.175.212 port 31890 ssh2
...
2020-06-24 14:17:03

Recently Reported IPs

21.214.118.156 26.70.219.19 63.217.49.27 162.117.96.13
58.242.140.220 24.66.146.204 137.215.72.198 154.241.65.144
19.88.34.150 134.166.101.3 247.177.178.43 83.171.252.196
167.76.35.54 178.174.95.78 148.245.223.71 142.25.86.9
67.68.59.142 161.244.86.33 104.193.199.94 189.157.74.53