Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: Hurricane Electric LLC

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
botsattackproxy
Ddos bot
2024-04-20 00:26:45
attackspambots
Tried our host z.
2020-08-18 16:10:40
attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-07-04 22:52:05
attackspam
 UDP 184.105.139.90:1384 -> port 69, len 42
2020-05-24 19:23:44
attackspam
firewall-block, port(s): 443/tcp
2020-01-25 17:02:47
attack
" "
2019-12-23 18:08:25
attackspam
Scanning random ports - tries to find possible vulnerable services
2019-09-01 15:58:22
attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-30 03:43:38
attack
scan z
2019-08-13 18:39:38
attackspam
445/tcp 21/tcp 11211/tcp...
[2019-05-03/07-02]38pkt,12pt.(tcp),2pt.(udp)
2019-07-02 17:26:29
attack
21/tcp 11211/tcp 50075/tcp...
[2019-04-21/06-21]32pkt,13pt.(tcp),2pt.(udp)
2019-06-21 13:50:09
Comments on same subnet:
IP Type Details Datetime
184.105.139.105 attackproxy
Compromised IP
2024-05-09 23:09:39
184.105.139.109 attackproxy
Vulnerability Scanner
2024-04-30 12:59:43
184.105.139.70 attack
Vulnerability Scanner
2024-04-20 00:30:49
184.105.139.68 attack
Vulnerability Scanner
2024-04-10 01:16:38
184.105.139.69 proxy
VPN fraud
2023-05-15 19:23:33
184.105.139.120 proxy
VPN fraud
2023-05-10 13:17:43
184.105.139.103 proxy
VPN fraud
2023-03-20 14:02:25
184.105.139.99 proxy
VPN fraud
2023-03-20 13:57:09
184.105.139.74 proxy
VPN
2023-01-30 14:03:54
184.105.139.86 proxy
VPN
2023-01-19 13:51:12
184.105.139.124 attackproxy
VPN
2022-12-29 20:40:24
184.105.139.124 attack
VPN
2022-12-29 20:40:21
184.105.139.126 proxy
Attack VPN
2022-12-09 13:59:02
184.105.139.70 attackbotsspam
 TCP (SYN) 184.105.139.70:51140 -> port 5900, len 40
2020-10-14 04:24:47
184.105.139.70 attackspam
 TCP (SYN) 184.105.139.70:51140 -> port 5900, len 40
2020-10-13 19:51:22
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 184.105.139.90
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23091
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;184.105.139.90.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061100 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Jun 11 15:12:55 CST 2019
;; MSG SIZE  rcvd: 118

Host info
90.139.105.184.in-addr.arpa is an alias for 90.64-26.139.105.184.in-addr.arpa.
90.64-26.139.105.184.in-addr.arpa domain name pointer scan-04e.shadowserver.org.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
90.139.105.184.in-addr.arpa	canonical name = 90.64-26.139.105.184.in-addr.arpa.
90.64-26.139.105.184.in-addr.arpa	name = scan-04e.shadowserver.org.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
175.23.200.177 attackbots
Port Scan: TCP/23
2019-08-05 10:41:39
171.34.46.194 attackspambots
Port Scan: UDP/49153
2019-08-05 11:16:41
185.176.27.14 attackspam
08/04/2019-17:48:55.618369 185.176.27.14 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-08-05 10:35:56
43.230.144.118 attack
Port Scan: TCP/445
2019-08-05 11:04:04
92.63.194.148 attackspam
08/04/2019-20:43:10.467616 92.63.194.148 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-05 10:49:16
37.49.231.104 attackbots
08/04/2019-18:35:57.169765 37.49.231.104 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 27
2019-08-05 11:05:27
198.15.72.130 attackbots
Port Scan: TCP/445
2019-08-05 11:10:55
185.220.101.28 attack
2019-08-05T02:26:47.313013abusebot-3.cloudsearch.cf sshd\[7808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.28  user=root
2019-08-05 10:35:23
209.119.226.100 attackbots
Port Scan: UDP/744
2019-08-05 11:07:41
188.121.214.224 attackspam
Port Scan: TCP/445
2019-08-05 11:14:35
106.75.65.85 attack
Port Scan: TCP/37215
2019-08-05 10:47:39
42.232.43.248 attackspambots
Port Scan: TCP/23
2019-08-05 11:04:33
67.250.27.54 attackspambots
Port Scan: UDP/926
2019-08-05 10:56:35
191.23.104.79 attackspambots
Port Scan: TCP/23
2019-08-05 11:13:32
71.38.167.215 attackbotsspam
Port Scan: UDP/1234
2019-08-05 10:55:46

Recently Reported IPs

203.135.58.195 46.4.71.36 189.45.42.149 182.151.214.108
66.60.203.117 118.89.215.182 117.41.42.0 53.130.142.48
34.66.205.68 123.183.129.193 219.72.129.35 217.249.4.151
102.39.48.158 201.253.253.214 222.25.222.109 153.215.114.171
128.199.240.173 103.67.218.11 83.13.191.18 45.67.14.148