Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 180.132.61.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47342
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;180.132.61.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011601 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 17 00:09:46 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 139.61.132.180.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.61.132.180.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
195.91.155.114 attackbots
¯\_(ツ)_/¯
2019-06-21 15:02:58
109.87.166.113 attackspambots
23/tcp 23/tcp
[2019-06-21]2pkt
2019-06-21 14:33:13
190.66.205.245 attackspambots
23/tcp
[2019-06-21]1pkt
2019-06-21 14:18:38
42.231.182.118 attack
23/tcp
[2019-06-21]1pkt
2019-06-21 14:20:16
162.243.145.81 attackbotsspam
scan z
2019-06-21 14:57:42
52.54.133.110 attackspambots
RDP Bruteforce
2019-06-21 14:34:40
112.133.229.241 attackspambots
Port scan: Attack repeated for 24 hours
2019-06-21 14:27:33
183.189.255.5 attackbots
/var/log/messages:Jun 20 16:29:20 sanyalnet-cloud-vps audispd: node=sanyalnet-cloud-vps.freeddns.org type=CRYPTO_SESSION msg=audhostname(1561048160.541:6357): pid=22044 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-server cipher=aexxxxxxx28-ctr ksize=128 mac=hmac-sha1 pfs=diffie-hellman-group14-sha1 spid=22045 suid=74 rport=40538 laddr=104.167.106.93 lport=22  exe="/usr/sbin/sshd" hostname=? addr=183.189.255.5 terminal=? res=success'
/var/log/messages:Jun 20 16:29:20 sanyalnet-cloud-vps audispd: node=sanyalnet-cloud-vps.freeddns.org type=CRYPTO_SESSION msg=audhostname(1561048160.543:6358): pid=22044 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-client cipher=aexxxxxxx28-ctr ksize=128 mac=hmac-sha1 pfs=diffie-hellman-group14-sha1 spid=22045 suid=74 rport=40538 laddr=104.167.106.93 lport=22  exe="/usr/sbin/sshd" hostname=? addr=183.189.255.5 terminal=? res=success'
/var/log/messages:Jun 20 16:29:22 sanyalnet-cloud-vps fail2ban.filte........
-------------------------------
2019-06-21 14:12:30
115.211.146.138 attackbotsspam
23/tcp
[2019-06-21]1pkt
2019-06-21 14:43:31
66.96.204.235 attackspam
22/tcp
[2019-06-21]1pkt
2019-06-21 14:15:25
76.187.16.62 attack
5555/tcp
[2019-06-21]1pkt
2019-06-21 14:38:40
62.117.67.46 attackspam
slow and persistent scanner
2019-06-21 14:10:59
24.37.234.186 attack
Probing for vulnerable services
2019-06-21 14:52:50
75.109.177.239 attackbots
" "
2019-06-21 14:57:13
159.89.234.142 attack
xmlrpc attack
2019-06-21 15:00:14

Recently Reported IPs

65.163.133.203 159.88.131.236 169.2.139.207 55.133.52.218
38.246.225.36 50.255.6.215 192.108.248.79 243.41.102.193
6.133.60.115 121.58.218.224 198.12.206.251 206.171.170.226
118.230.42.46 21.243.214.96 45.32.127.186 73.111.34.109
198.226.92.243 14.13.11.170 111.121.71.207 241.187.87.232