Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Singapore

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.139.58.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45699
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;18.139.58.2.			IN	A

;; AUTHORITY SECTION:
.			467	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020051701 1800 900 604800 86400

;; Query time: 535 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 18 07:55:29 CST 2020
;; MSG SIZE  rcvd: 115
Host info
2.58.139.18.in-addr.arpa domain name pointer ec2-18-139-58-2.ap-southeast-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
2.58.139.18.in-addr.arpa	name = ec2-18-139-58-2.ap-southeast-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
139.59.25.230 attack
Invalid user applmgr from 139.59.25.230 port 58996
2019-08-23 23:53:04
182.119.154.243 attackspam
Invalid user admin from 182.119.154.243 port 45091
2019-08-23 23:38:26
180.183.244.160 attack
Invalid user admin from 180.183.244.160 port 46201
2019-08-23 23:39:39
120.220.15.5 attackspam
Invalid user test from 120.220.15.5 port 2134
2019-08-24 00:02:22
159.65.88.161 attack
Aug 23 13:26:55 XXX sshd[25010]: Invalid user java from 159.65.88.161 port 42583
2019-08-23 23:47:17
139.59.56.121 attackspambots
leo_www
2019-08-23 23:52:38
192.162.68.207 attackspambots
WordPress login Brute force / Web App Attack on client site.
2019-08-23 23:34:29
123.214.186.186 attackspambots
SSHD brute force attack detected by fail2ban
2019-08-23 23:59:04
128.199.88.125 attackbotsspam
$f2bV_matches_ltvn
2019-08-23 23:56:25
122.248.38.28 attackspambots
Aug 23 22:38:21 lcl-usvr-02 sshd[28776]: Invalid user vbox from 122.248.38.28 port 39964
Aug 23 22:38:21 lcl-usvr-02 sshd[28776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.248.38.28
Aug 23 22:38:21 lcl-usvr-02 sshd[28776]: Invalid user vbox from 122.248.38.28 port 39964
Aug 23 22:38:23 lcl-usvr-02 sshd[28776]: Failed password for invalid user vbox from 122.248.38.28 port 39964 ssh2
Aug 23 22:44:45 lcl-usvr-02 sshd[30332]: Invalid user date from 122.248.38.28 port 40458
...
2019-08-24 00:00:55
188.131.228.31 attackspambots
Invalid user bcampion from 188.131.228.31 port 46078
2019-08-23 23:37:26
192.144.187.10 attackspambots
Invalid user betyortodontia from 192.144.187.10 port 41088
2019-08-23 23:35:08
132.255.29.228 attack
Invalid user admin from 132.255.29.228 port 33418
2019-08-23 23:55:00
200.40.45.82 attackbots
Invalid user linux from 200.40.45.82 port 52896
2019-08-23 23:26:57
144.217.255.89 attackspambots
Invalid user john from 144.217.255.89 port 56500
2019-08-23 23:51:26

Recently Reported IPs

15.236.175.94 152.160.3.255 12.72.103.168 209.50.123.94
87.22.252.205 190.47.60.203 221.228.175.247 64.21.86.99
222.5.125.130 49.47.202.192 171.36.33.192 208.2.55.211
1.220.33.254 70.167.123.196 46.204.110.78 75.74.38.224
71.175.249.5 87.142.230.188 155.207.16.50 82.136.117.206