Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Fremont

Region: California

Country: United States

Internet Service Provider: Hurricane Electric LLC

Hostname: unknown

Organization: Hurricane Electric LLC

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
 TCP (SYN) 184.105.139.82:36802 -> port 5900, len 44
2020-09-22 03:21:06
attackbotsspam
srv02 Mass scanning activity detected Target: 4786  ..
2020-09-21 19:06:41
attackspambots
 TCP (SYN) 184.105.139.82:41761 -> port 2323, len 44
2020-07-26 22:54:00
attackbots
Unauthorised access (Jul 22) SRC=184.105.139.82 LEN=40 TTL=242 ID=54321 TCP DPT=8080 WINDOW=65535 SYN
2020-07-23 04:21:38
attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-07-04 23:01:29
attackbotsspam
 UDP 184.105.139.82:37165 -> port 123, len 40
2020-05-27 07:02:32
attackspambots
7547/tcp 50070/tcp 27017/tcp...
[2020-02-08/04-08]36pkt,13pt.(tcp),2pt.(udp)
2020-04-09 03:05:51
attackbotsspam
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2019-12-16 04:58:31
attack
scan z
2019-10-22 19:49:20
attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-16 22:39:30
attack
1570859611 - 10/12/2019 07:53:31 Host: scan-04c.shadowserver.org/184.105.139.82 Port: 123 UDP Blocked
2019-10-12 20:40:58
attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-11 02:13:09
attackspam
Automatic report - Port Scan Attack
2019-09-07 16:52:34
attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-12 19:02:48
attackbots
Automatic report - Port Scan Attack
2019-07-20 11:46:57
attack
Automatic report - Port Scan Attack
2019-07-18 13:23:24
attackspambots
proto=tcp  .  spt=53947  .  dpt=3389  .  src=184.105.139.82  .  dst=xx.xx.4.1  .     (listed on     Github Combined on 4 lists )     (738)
2019-07-04 00:36:20
attackbotsspam
5555/tcp 548/tcp 4786/tcp...
[2019-04-30/06-30]46pkt,9pt.(tcp),2pt.(udp)
2019-07-01 04:11:07
attackbotsspam
scan r
2019-06-23 10:23:00
Comments on same subnet:
IP Type Details Datetime
184.105.139.105 attackproxy
Compromised IP
2024-05-09 23:09:39
184.105.139.109 attackproxy
Vulnerability Scanner
2024-04-30 12:59:43
184.105.139.70 attack
Vulnerability Scanner
2024-04-20 00:30:49
184.105.139.90 botsattackproxy
Ddos bot
2024-04-20 00:26:45
184.105.139.68 attack
Vulnerability Scanner
2024-04-10 01:16:38
184.105.139.69 proxy
VPN fraud
2023-05-15 19:23:33
184.105.139.120 proxy
VPN fraud
2023-05-10 13:17:43
184.105.139.103 proxy
VPN fraud
2023-03-20 14:02:25
184.105.139.99 proxy
VPN fraud
2023-03-20 13:57:09
184.105.139.74 proxy
VPN
2023-01-30 14:03:54
184.105.139.86 proxy
VPN
2023-01-19 13:51:12
184.105.139.124 attackproxy
VPN
2022-12-29 20:40:24
184.105.139.124 attack
VPN
2022-12-29 20:40:21
184.105.139.126 proxy
Attack VPN
2022-12-09 13:59:02
184.105.139.70 attackbotsspam
 TCP (SYN) 184.105.139.70:51140 -> port 5900, len 40
2020-10-14 04:24:47
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 184.105.139.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64183
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;184.105.139.82.			IN	A

;; AUTHORITY SECTION:
.			2441	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019032800 1800 900 604800 86400

;; Query time: 95 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 29 00:26:20 CST 2019
;; MSG SIZE  rcvd: 118

Host info
82.139.105.184.in-addr.arpa is an alias for 82.64-26.139.105.184.in-addr.arpa.
82.64-26.139.105.184.in-addr.arpa domain name pointer scan-04c.shadowserver.org.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
82.139.105.184.in-addr.arpa	canonical name = 82.64-26.139.105.184.in-addr.arpa.
82.64-26.139.105.184.in-addr.arpa	name = scan-04c.shadowserver.org.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
94.191.58.157 attackspambots
Sep 11 04:29:16 php1 sshd\[6334\]: Invalid user ftpuser2 from 94.191.58.157
Sep 11 04:29:16 php1 sshd\[6334\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.58.157
Sep 11 04:29:19 php1 sshd\[6334\]: Failed password for invalid user ftpuser2 from 94.191.58.157 port 48350 ssh2
Sep 11 04:38:50 php1 sshd\[7755\]: Invalid user 1q2w3e4r from 94.191.58.157
Sep 11 04:38:50 php1 sshd\[7755\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.58.157
2019-09-11 22:41:38
213.8.10.51 attack
SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-09-11 22:42:16
193.169.255.137 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-11 13:33:54,634 INFO [amun_request_handler] PortScan Detected on Port: 25 (193.169.255.137)
2019-09-11 23:29:58
37.59.53.22 attackspam
Sep 11 16:04:25 herz-der-gamer sshd[20004]: Invalid user gmodserver from 37.59.53.22 port 57270
...
2019-09-11 22:27:30
148.66.142.135 attack
Sep 11 14:46:44 game-panel sshd[8826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.142.135
Sep 11 14:46:47 game-panel sshd[8826]: Failed password for invalid user 1234 from 148.66.142.135 port 58556 ssh2
Sep 11 14:54:04 game-panel sshd[9177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.142.135
2019-09-11 23:10:26
78.140.221.186 attack
*** Phishing website that camouflaged Amazon.com.

http://resetting-account-recovery-support-amazn.com/
2019-09-11 22:17:59
217.64.109.231 attackspam
SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-09-11 22:28:11
54.39.50.204 attackbots
Sep 11 16:37:09 eventyay sshd[3375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.50.204
Sep 11 16:37:11 eventyay sshd[3375]: Failed password for invalid user admin from 54.39.50.204 port 10714 ssh2
Sep 11 16:43:29 eventyay sshd[3513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.50.204
...
2019-09-11 22:50:21
51.75.65.209 attackbots
Sep 11 11:33:48 SilenceServices sshd[22430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.65.209
Sep 11 11:33:50 SilenceServices sshd[22430]: Failed password for invalid user bkpuser from 51.75.65.209 port 41632 ssh2
Sep 11 11:39:11 SilenceServices sshd[24504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.65.209
2019-09-11 22:34:13
162.243.4.134 attackbots
/var/log/secure-20190901:Aug 28 20:22:47 XXX sshd[39918]: Invalid user benjamin from 162.243.4.134 port 47842
2019-09-11 23:09:32
164.132.104.58 attackbotsspam
Sep 11 11:40:40 SilenceServices sshd[25068]: Failed password for git from 164.132.104.58 port 35152 ssh2
Sep 11 11:46:19 SilenceServices sshd[27155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.104.58
Sep 11 11:46:21 SilenceServices sshd[27155]: Failed password for invalid user steam from 164.132.104.58 port 44028 ssh2
2019-09-11 23:28:58
159.65.218.8 attackspambots
Received disconnect
2019-09-11 22:36:06
1.193.160.164 attackspam
Sep 11 17:09:31 eventyay sshd[4088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.193.160.164
Sep 11 17:09:33 eventyay sshd[4088]: Failed password for invalid user uploader from 1.193.160.164 port 62184 ssh2
Sep 11 17:19:13 eventyay sshd[4253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.193.160.164
...
2019-09-11 23:26:23
191.243.72.34 attack
SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-09-11 23:22:25
177.40.34.114 attackspam
2323/tcp
[2019-09-11]1pkt
2019-09-11 23:33:03

Recently Reported IPs

207.179.226.85 91.92.109.43 24.104.74.26 188.2.61.41
89.90.209.252 5.39.16.117 74.208.200.74 5.44.39.91
177.86.158.222 125.212.233.50 125.212.192.201 81.214.54.139
14.169.182.223 220.246.24.3 42.51.220.35 138.68.170.73
104.248.181.156 195.175.84.150 91.232.45.15 58.242.83.27