Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: Hydra Communications Ltd

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 185.121.139.229
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21779
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;185.121.139.229.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051301 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue May 14 01:46:00 CST 2019
;; MSG SIZE  rcvd: 119

Host info
229.139.121.185.in-addr.arpa domain name pointer 229.139.121.185.baremetal.zare.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
229.139.121.185.in-addr.arpa	name = 229.139.121.185.baremetal.zare.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
106.13.81.18 attack
Jan 14 14:05:12 vps647732 sshd[9504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.81.18
Jan 14 14:05:14 vps647732 sshd[9504]: Failed password for invalid user fourjs from 106.13.81.18 port 49616 ssh2
...
2020-01-14 21:16:59
5.88.168.246 attackbotsspam
Jan 14 14:02:28 sd-53420 sshd\[23342\]: Invalid user admin from 5.88.168.246
Jan 14 14:02:28 sd-53420 sshd\[23342\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.88.168.246
Jan 14 14:02:30 sd-53420 sshd\[23342\]: Failed password for invalid user admin from 5.88.168.246 port 33138 ssh2
Jan 14 14:05:19 sd-53420 sshd\[23835\]: User root from 5.88.168.246 not allowed because none of user's groups are listed in AllowGroups
Jan 14 14:05:19 sd-53420 sshd\[23835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.88.168.246  user=root
...
2020-01-14 21:10:23
110.53.234.52 attack
ICMP MH Probe, Scan /Distributed -
2020-01-14 21:15:17
106.13.22.60 attack
Jan 14 14:03:33 meumeu sshd[5592]: Failed password for root from 106.13.22.60 port 55292 ssh2
Jan 14 14:05:17 meumeu sshd[5838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.22.60 
Jan 14 14:05:19 meumeu sshd[5838]: Failed password for invalid user hexin from 106.13.22.60 port 39744 ssh2
...
2020-01-14 21:09:59
222.186.169.194 attackbots
2020-01-14T14:14:43.101719vps751288.ovh.net sshd\[2791\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.194  user=root
2020-01-14T14:14:44.921227vps751288.ovh.net sshd\[2791\]: Failed password for root from 222.186.169.194 port 40152 ssh2
2020-01-14T14:14:48.396294vps751288.ovh.net sshd\[2791\]: Failed password for root from 222.186.169.194 port 40152 ssh2
2020-01-14T14:14:50.948951vps751288.ovh.net sshd\[2791\]: Failed password for root from 222.186.169.194 port 40152 ssh2
2020-01-14T14:14:54.248306vps751288.ovh.net sshd\[2791\]: Failed password for root from 222.186.169.194 port 40152 ssh2
2020-01-14 21:33:37
189.79.22.8 attackbots
Unauthorized connection attempt detected from IP address 189.79.22.8 to port 23 [J]
2020-01-14 21:06:54
90.76.144.93 attackspam
Unauthorized connection attempt detected from IP address 90.76.144.93 to port 23 [J]
2020-01-14 20:59:05
150.136.175.240 attackbots
2020-01-14 12:27:49 auth_login authenticator failed for (ADMIN) [150.136.175.240]: 535 Incorrect authentication data (set_id=test@weenegret.ru)
2020-01-14 14:05:00 auth_login authenticator failed for (ADMIN) [150.136.175.240]: 535 Incorrect authentication data (set_id=test@weenegret.ru)
...
2020-01-14 21:31:20
200.85.4.121 attack
Unauthorized connection attempt detected from IP address 200.85.4.121 to port 2220 [J]
2020-01-14 21:29:29
77.42.126.247 attackbots
Automatic report - Port Scan Attack
2020-01-14 21:18:43
46.43.87.116 attackbots
Automatic report - Port Scan Attack
2020-01-14 21:20:16
178.93.16.205 attackspam
Unauthorized connection attempt detected from IP address 178.93.16.205 to port 8080 [J]
2020-01-14 20:54:14
171.95.224.242 attackspambots
Unauthorized connection attempt detected from IP address 171.95.224.242 to port 2323 [J]
2020-01-14 20:55:06
167.71.79.152 attack
Jan 14 12:29:56 nbi-636 sshd[2499]: Invalid user user02 from 167.71.79.152 port 42232
Jan 14 12:29:58 nbi-636 sshd[2499]: Failed password for invalid user user02 from 167.71.79.152 port 42232 ssh2
Jan 14 12:29:58 nbi-636 sshd[2499]: Received disconnect from 167.71.79.152 port 42232:11: Bye Bye [preauth]
Jan 14 12:29:58 nbi-636 sshd[2499]: Disconnected from 167.71.79.152 port 42232 [preauth]
Jan 14 12:39:36 nbi-636 sshd[5666]: User r.r from 167.71.79.152 not allowed because not listed in AllowUsers
Jan 14 12:39:36 nbi-636 sshd[5666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.79.152  user=r.r
Jan 14 12:39:38 nbi-636 sshd[5666]: Failed password for invalid user r.r from 167.71.79.152 port 41684 ssh2
Jan 14 12:39:38 nbi-636 sshd[5666]: Received disconnect from 167.71.79.152 port 41684:11: Bye Bye [preauth]
Jan 14 12:39:38 nbi-636 sshd[5666]: Disconnected from 167.71.79.152 port 41684 [preauth]
Jan 14 12:41:43 nbi-636 sshd........
-------------------------------
2020-01-14 21:17:53
62.86.6.98 attackspam
400 BAD REQUEST
2020-01-14 21:19:50

Recently Reported IPs

61.206.75.48 109.122.91.190 79.29.185.170 102.87.199.41
117.60.62.176 78.94.218.14 123.27.3.246 47.199.146.0
112.67.229.251 5.103.227.50 172.104.235.157 99.179.223.11
123.164.120.249 191.238.212.48 188.57.162.153 55.45.65.160
209.97.132.154 165.22.72.102 95.178.156.141 190.209.89.113