Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 183.168.64.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14017
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;183.168.64.139.			IN	A

;; AUTHORITY SECTION:
.			281	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011201 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 13 05:32:34 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 139.64.168.183.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.64.168.183.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
119.29.15.124 attackspam
Oct 19 22:25:53 host sshd[24998]: Invalid user ts3 from 119.29.15.124 port 46212
Oct 19 22:25:53 host sshd[24998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.15.124
Oct 19 22:25:53 host sshd[24998]: Invalid user ts3 from 119.29.15.124 port 46212
Oct 19 22:25:55 host sshd[24998]: Failed password for invalid user ts3 from 119.29.15.124 port 46212 ssh2
...
2019-10-20 06:48:48
91.109.5.232 attackspambots
Automatic report - Banned IP Access
2019-10-20 07:04:34
162.247.74.216 attackspambots
Oct 20 01:00:40 rotator sshd\[29550\]: Failed password for root from 162.247.74.216 port 41514 ssh2Oct 20 01:00:42 rotator sshd\[29550\]: Failed password for root from 162.247.74.216 port 41514 ssh2Oct 20 01:00:46 rotator sshd\[29550\]: Failed password for root from 162.247.74.216 port 41514 ssh2Oct 20 01:00:48 rotator sshd\[29550\]: Failed password for root from 162.247.74.216 port 41514 ssh2Oct 20 01:00:52 rotator sshd\[29550\]: Failed password for root from 162.247.74.216 port 41514 ssh2Oct 20 01:00:54 rotator sshd\[29550\]: Failed password for root from 162.247.74.216 port 41514 ssh2
...
2019-10-20 07:07:25
222.186.175.154 attack
Oct 19 23:03:32 marvibiene sshd[8071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154  user=root
Oct 19 23:03:34 marvibiene sshd[8071]: Failed password for root from 222.186.175.154 port 18762 ssh2
Oct 19 23:03:38 marvibiene sshd[8071]: Failed password for root from 222.186.175.154 port 18762 ssh2
Oct 19 23:03:32 marvibiene sshd[8071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154  user=root
Oct 19 23:03:34 marvibiene sshd[8071]: Failed password for root from 222.186.175.154 port 18762 ssh2
Oct 19 23:03:38 marvibiene sshd[8071]: Failed password for root from 222.186.175.154 port 18762 ssh2
...
2019-10-20 07:05:30
40.129.118.233 attack
Automatic report - Port Scan Attack
2019-10-20 06:54:45
114.32.81.235 attackspambots
" "
2019-10-20 07:15:44
121.33.247.107 attack
Oct 20 01:01:12 andromeda postfix/smtpd\[56357\]: warning: unknown\[121.33.247.107\]: SASL LOGIN authentication failed: authentication failure
Oct 20 01:01:15 andromeda postfix/smtpd\[1966\]: warning: unknown\[121.33.247.107\]: SASL LOGIN authentication failed: authentication failure
Oct 20 01:01:18 andromeda postfix/smtpd\[56357\]: warning: unknown\[121.33.247.107\]: SASL LOGIN authentication failed: authentication failure
Oct 20 01:01:23 andromeda postfix/smtpd\[6029\]: warning: unknown\[121.33.247.107\]: SASL LOGIN authentication failed: authentication failure
Oct 20 01:01:29 andromeda postfix/smtpd\[56357\]: warning: unknown\[121.33.247.107\]: SASL LOGIN authentication failed: authentication failure
2019-10-20 07:10:06
85.202.10.42 attackspambots
Oct 19 22:50:27 vtv3 sshd\[11682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.202.10.42  user=root
Oct 19 22:50:29 vtv3 sshd\[11682\]: Failed password for root from 85.202.10.42 port 53137 ssh2
Oct 19 22:54:21 vtv3 sshd\[13398\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.202.10.42  user=root
Oct 19 22:54:24 vtv3 sshd\[13398\]: Failed password for root from 85.202.10.42 port 44914 ssh2
Oct 19 22:58:19 vtv3 sshd\[15416\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.202.10.42  user=root
Oct 19 23:10:20 vtv3 sshd\[21606\]: Invalid user !@\#$% from 85.202.10.42 port 40238
Oct 19 23:10:20 vtv3 sshd\[21606\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.202.10.42
Oct 19 23:10:22 vtv3 sshd\[21606\]: Failed password for invalid user !@\#$% from 85.202.10.42 port 40238 ssh2
Oct 19 23:14:23 vtv3 sshd\[23181\]: Invalid us
2019-10-20 06:49:56
47.52.75.105 attackspambots
Looking for resource vulnerabilities
2019-10-20 07:20:30
81.22.45.65 attackspambots
Oct 20 00:45:40 mc1 kernel: \[2811499.108509\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.65 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=43730 PROTO=TCP SPT=42765 DPT=15980 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 20 00:51:48 mc1 kernel: \[2811867.636848\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.65 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=63966 PROTO=TCP SPT=42765 DPT=15930 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 20 00:52:54 mc1 kernel: \[2811933.691537\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.65 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=30566 PROTO=TCP SPT=42765 DPT=15907 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-10-20 07:08:53
83.221.222.251 attack
Oct 19 22:27:56 ip-172-31-62-245 sshd\[1663\]: Invalid user teamspeakteamspeak from 83.221.222.251\
Oct 19 22:27:57 ip-172-31-62-245 sshd\[1663\]: Failed password for invalid user teamspeakteamspeak from 83.221.222.251 port 57136 ssh2\
Oct 19 22:32:44 ip-172-31-62-245 sshd\[1676\]: Invalid user P@ssword from 83.221.222.251\
Oct 19 22:32:46 ip-172-31-62-245 sshd\[1676\]: Failed password for invalid user P@ssword from 83.221.222.251 port 36422 ssh2\
Oct 19 22:37:30 ip-172-31-62-245 sshd\[1701\]: Invalid user lk from 83.221.222.251\
2019-10-20 07:05:15
106.12.83.210 attackbotsspam
May  6 19:24:26 server sshd\[166011\]: Invalid user mapr from 106.12.83.210
May  6 19:24:26 server sshd\[166011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.83.210
May  6 19:24:28 server sshd\[166011\]: Failed password for invalid user mapr from 106.12.83.210 port 45914 ssh2
...
2019-10-20 06:52:35
46.38.144.202 attackbotsspam
Oct 20 00:52:19 webserver postfix/smtpd\[29213\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 20 00:53:58 webserver postfix/smtpd\[29213\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 20 00:56:01 webserver postfix/smtpd\[29213\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 20 00:57:57 webserver postfix/smtpd\[29213\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 20 00:59:54 webserver postfix/smtpd\[29934\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-10-20 07:13:40
222.180.199.138 attackspambots
Invalid user user from 222.180.199.138 port 22274
2019-10-20 06:57:39
67.207.94.61 attackspambots
MYH,DEF GET /news/wp-login.php
2019-10-20 06:58:41

Recently Reported IPs

143.100.237.105 66.70.235.48 219.111.231.235 180.88.184.49
252.48.233.5 142.148.118.185 156.28.18.63 178.37.234.106
118.232.64.246 31.85.183.24 174.100.5.151 45.168.245.179
137.78.114.118 253.5.216.200 234.68.8.213 194.120.94.149
79.137.95.91 34.107.226.69 150.107.205.101 251.105.215.209