Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 183.130.146.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61546
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;183.130.146.139.		IN	A

;; AUTHORITY SECTION:
.			176	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091502 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 16 12:04:25 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 139.146.130.183.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.146.130.183.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
123.108.50.164 attackbots
SSH Brute Force
2020-08-10 01:32:09
209.45.76.233 attackbots
[N10.H1.VM1] Port Scanner Detected Blocked by UFW
2020-08-10 01:55:48
49.233.12.222 attack
"$f2bV_matches"
2020-08-10 01:52:24
112.199.98.42 attackspam
Aug  9 07:43:46 mockhub sshd[23526]: Failed password for root from 112.199.98.42 port 42704 ssh2
...
2020-08-10 02:07:31
176.31.182.79 attack
$f2bV_matches
2020-08-10 01:45:15
145.239.29.50 attack
Port Scan detected!
...
2020-08-10 01:38:16
195.228.76.248 attackbotsspam
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-08-10 01:41:54
111.93.10.213 attackspambots
Aug  9 20:00:12  sshd\[4024\]: User root from 111.93.10.213 not allowed because not listed in AllowUsersAug  9 20:00:14  sshd\[4024\]: Failed password for invalid user root from 111.93.10.213 port 38236 ssh2
...
2020-08-10 02:03:18
36.94.100.74 attack
Aug  9 18:05:51 rancher-0 sshd[955316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.94.100.74  user=root
Aug  9 18:05:54 rancher-0 sshd[955316]: Failed password for root from 36.94.100.74 port 52452 ssh2
...
2020-08-10 01:30:26
113.21.123.26 attackbots
Dovecot Invalid User Login Attempt.
2020-08-10 02:04:01
118.24.106.210 attackspambots
SSH Brute Force
2020-08-10 02:07:54
50.80.72.239 attackspam
Sent packet to closed port: 9530
2020-08-10 01:54:54
51.83.66.171 attackbots
Sent packet to closed port: 6000
2020-08-10 01:51:39
112.85.42.200 attackspam
Brute-force attempt banned
2020-08-10 02:00:56
212.185.58.83 attack
Aug  9 16:18:55 ns3033917 sshd[329]: Failed password for root from 212.185.58.83 port 54304 ssh2
Aug  9 16:22:07 ns3033917 sshd[341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.185.58.83  user=root
Aug  9 16:22:09 ns3033917 sshd[341]: Failed password for root from 212.185.58.83 port 52008 ssh2
...
2020-08-10 01:30:40

Recently Reported IPs

119.176.82.228 154.202.113.71 117.12.193.137 154.6.82.135
154.53.58.152 223.13.80.75 131.161.255.23 135.148.2.22
180.125.101.131 45.229.19.124 182.101.46.61 46.100.59.181
45.192.138.101 154.3.44.136 206.189.37.90 183.87.231.38
83.171.227.71 18.183.152.143 5.255.103.52 107.174.139.59