Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Urgench

Region: Xorazm Region

Country: Uzbekistan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
185.139.137.34 attack
Automatic report - Port Scan Attack
2020-09-08 21:57:22
185.139.137.34 attackbotsspam
Automatic report - Port Scan Attack
2020-09-08 06:21:11
185.139.137.35 attackbotsspam
Unauthorized connection attempt detected from IP address 185.139.137.35 to port 5900
2020-06-22 07:24:11
185.139.137.19 attack
Het IP-adres [185.139.137.19] is geblokkeerd door DS918 via FTP
2020-06-17 23:16:10
185.139.137.183 attackspam
Email rejected due to spam filtering
2020-05-30 22:13:08
185.139.137.167 attack
Automatic report - Port Scan Attack
2020-05-02 22:40:47
Whois info:
b
Dig info:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 185.139.137.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34570
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;185.139.137.143.		IN	A

;; Query time: 1 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Sat Jun 26 17:58:43 CST 2021
;; MSG SIZE  rcvd: 44

'
Host info
Host 143.137.139.185.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 143.137.139.185.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
36.57.177.141 attackspambots
2,38-01/01 [bc02/m83] PostRequest-Spammer scoring: Lusaka01
2019-10-19 19:15:54
138.197.162.32 attackbots
Automatic report - Banned IP Access
2019-10-19 19:34:35
180.243.234.213 attackspambots
Unauthorised access (Oct 19) SRC=180.243.234.213 LEN=52 TTL=247 ID=12093 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-19 19:26:07
187.190.235.89 attackbots
Invalid user jc from 187.190.235.89 port 37259
2019-10-19 19:56:03
81.84.235.209 attack
Invalid user amigo from 81.84.235.209 port 42478
2019-10-19 19:56:37
119.205.220.98 attackspam
Oct 19 14:33:46 server sshd\[13048\]: Invalid user testing from 119.205.220.98 port 54106
Oct 19 14:33:46 server sshd\[13048\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.205.220.98
Oct 19 14:33:48 server sshd\[13048\]: Failed password for invalid user testing from 119.205.220.98 port 54106 ssh2
Oct 19 14:42:30 server sshd\[17463\]: User root from 119.205.220.98 not allowed because listed in DenyUsers
Oct 19 14:42:30 server sshd\[17463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.205.220.98  user=root
2019-10-19 19:49:48
112.13.91.29 attack
Oct 19 13:12:07 xeon sshd[47422]: Failed password for root from 112.13.91.29 port 2799 ssh2
2019-10-19 19:40:32
222.186.173.201 attackbotsspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.201  user=root
Failed password for root from 222.186.173.201 port 53882 ssh2
Failed password for root from 222.186.173.201 port 53882 ssh2
Failed password for root from 222.186.173.201 port 53882 ssh2
Failed password for root from 222.186.173.201 port 53882 ssh2
2019-10-19 19:32:17
171.34.166.145 attack
*Port Scan* detected from 171.34.166.145 (CN/China/145.166.34.171.adsl-pool.jx.chinaunicom.com). 4 hits in the last 50 seconds
2019-10-19 19:37:44
113.236.163.109 attackspambots
Unauthorised access (Oct 19) SRC=113.236.163.109 LEN=40 TTL=49 ID=33161 TCP DPT=8080 WINDOW=34033 SYN 
Unauthorised access (Oct 19) SRC=113.236.163.109 LEN=40 TTL=49 ID=39485 TCP DPT=8080 WINDOW=34033 SYN 
Unauthorised access (Oct 17) SRC=113.236.163.109 LEN=40 TTL=49 ID=61893 TCP DPT=8080 WINDOW=34033 SYN 
Unauthorised access (Oct 17) SRC=113.236.163.109 LEN=40 TTL=49 ID=50106 TCP DPT=8080 WINDOW=37601 SYN 
Unauthorised access (Oct 17) SRC=113.236.163.109 LEN=40 TTL=49 ID=50265 TCP DPT=8080 WINDOW=37601 SYN
2019-10-19 19:29:17
124.204.68.242 attackbots
SSH Brute-Force reported by Fail2Ban
2019-10-19 19:54:33
117.158.94.153 attack
port scan and connect, tcp 1433 (ms-sql-s)
2019-10-19 19:46:42
114.142.48.78 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/114.142.48.78/ 
 
 JP - 1H : (32)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : JP 
 NAME ASN : ASN7679 
 
 IP : 114.142.48.78 
 
 CIDR : 114.142.0.0/17 
 
 PREFIX COUNT : 36 
 
 UNIQUE IP COUNT : 696320 
 
 
 ATTACKS DETECTED ASN7679 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 2 
 24H - 3 
 
 DateTime : 2019-10-19 05:44:45 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-19 19:39:39
164.132.44.25 attackspambots
Oct 18 18:09:53 auw2 sshd\[26803\]: Invalid user zZ123456789 from 164.132.44.25
Oct 18 18:09:53 auw2 sshd\[26803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=25.ip-164-132-44.eu
Oct 18 18:09:54 auw2 sshd\[26803\]: Failed password for invalid user zZ123456789 from 164.132.44.25 port 56156 ssh2
Oct 18 18:13:37 auw2 sshd\[27073\]: Invalid user nanos from 164.132.44.25
Oct 18 18:13:37 auw2 sshd\[27073\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=25.ip-164-132-44.eu
2019-10-19 19:47:26
124.41.211.78 attackbotsspam
Cluster member 192.168.0.31 (-) said, DENY 124.41.211.78, Reason:[(imapd) Failed IMAP login from 124.41.211.78 (NP/Nepal/78.211.41.124.dynamic.wlink.com.np): 1 in the last 3600 secs]
2019-10-19 19:20:48

Recently Reported IPs

110.39.195.74 212.96.201.205 123.24.131.22 218.18.146.73
116.21.123.71 36.6.141.214 114.237.194.50 183.17.49.92
125.69.70.119 46.114.108.218 156.146.63.13 35.232.56.129
71.91.210.171 36.112.11.12 108.51.225.44 204.87.19.9
180.222.138.185 185.139.138.69 119.15.83.196 45.155.205.9