Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
2.139.220.30 attackbots
Aug 25 08:58:41 ajax sshd[32303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.220.30 
Aug 25 08:58:43 ajax sshd[32303]: Failed password for invalid user soi from 2.139.220.30 port 34488 ssh2
2020-08-25 16:05:16
2.139.220.30 attackbotsspam
2020-08-23 UTC: (2x) - ts(2x)
2020-08-24 17:48:38
2.139.220.30 attack
Aug 21 22:44:03 kh-dev-server sshd[29889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.220.30
...
2020-08-22 04:57:08
2.139.220.30 attackbotsspam
2020-08-20T15:04:38.956947afi-git.jinr.ru sshd[662]: Failed password for invalid user debian from 2.139.220.30 port 44970 ssh2
2020-08-20T15:08:33.093947afi-git.jinr.ru sshd[1729]: Invalid user storm from 2.139.220.30 port 53724
2020-08-20T15:08:33.097480afi-git.jinr.ru sshd[1729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.220.30
2020-08-20T15:08:33.093947afi-git.jinr.ru sshd[1729]: Invalid user storm from 2.139.220.30 port 53724
2020-08-20T15:08:35.368254afi-git.jinr.ru sshd[1729]: Failed password for invalid user storm from 2.139.220.30 port 53724 ssh2
...
2020-08-20 20:25:11
2.139.220.30 attackbots
Aug 17 21:39:14 ip-172-31-16-56 sshd\[10242\]: Invalid user lxr from 2.139.220.30\
Aug 17 21:39:16 ip-172-31-16-56 sshd\[10242\]: Failed password for invalid user lxr from 2.139.220.30 port 59304 ssh2\
Aug 17 21:42:14 ip-172-31-16-56 sshd\[10293\]: Invalid user admin from 2.139.220.30\
Aug 17 21:42:16 ip-172-31-16-56 sshd\[10293\]: Failed password for invalid user admin from 2.139.220.30 port 54398 ssh2\
Aug 17 21:45:18 ip-172-31-16-56 sshd\[10342\]: Invalid user rails from 2.139.220.30\
2020-08-18 07:39:35
2.139.220.30 attackspambots
Aug 17 14:33:23 rush sshd[4373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.220.30
Aug 17 14:33:25 rush sshd[4373]: Failed password for invalid user testuser from 2.139.220.30 port 36212 ssh2
Aug 17 14:37:54 rush sshd[4568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.220.30
...
2020-08-17 23:03:39
2.139.220.30 attackspam
k+ssh-bruteforce
2020-08-07 08:06:41
2.139.220.30 attackspambots
Tried sshing with brute force.
2020-07-25 01:08:19
2.139.220.30 attack
Jul 21 05:54:43 vmd36147 sshd[30106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.220.30
Jul 21 05:54:45 vmd36147 sshd[30106]: Failed password for invalid user centos from 2.139.220.30 port 55754 ssh2
Jul 21 05:58:54 vmd36147 sshd[7679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.220.30
...
2020-07-21 12:06:09
2.139.220.30 attackbots
Jul 16 21:58:02 itv-usvr-01 sshd[22035]: Invalid user servicedesk from 2.139.220.30
Jul 16 21:58:02 itv-usvr-01 sshd[22035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.220.30
Jul 16 21:58:02 itv-usvr-01 sshd[22035]: Invalid user servicedesk from 2.139.220.30
Jul 16 21:58:05 itv-usvr-01 sshd[22035]: Failed password for invalid user servicedesk from 2.139.220.30 port 58988 ssh2
Jul 16 22:02:39 itv-usvr-01 sshd[22214]: Invalid user fms from 2.139.220.30
2020-07-17 01:29:38
2.139.220.30 attackspambots
2020-07-16T02:01:15.990671vps2034 sshd[31926]: Invalid user data from 2.139.220.30 port 58426
2020-07-16T02:01:15.995670vps2034 sshd[31926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.220.30
2020-07-16T02:01:15.990671vps2034 sshd[31926]: Invalid user data from 2.139.220.30 port 58426
2020-07-16T02:01:18.298180vps2034 sshd[31926]: Failed password for invalid user data from 2.139.220.30 port 58426 ssh2
2020-07-16T02:05:24.003045vps2034 sshd[9647]: Invalid user lidio from 2.139.220.30 port 44194
...
2020-07-16 14:21:38
2.139.220.30 attackbotsspam
Jul 12 06:55:18 root sshd[9005]: Invalid user satu from 2.139.220.30
...
2020-07-12 13:22:25
2.139.220.30 attack
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-07-12 05:47:36
2.139.220.30 attackbots
Jul 10 08:04:59 onepixel sshd[1933716]: Invalid user bogdan from 2.139.220.30 port 56634
Jul 10 08:04:59 onepixel sshd[1933716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.220.30 
Jul 10 08:04:59 onepixel sshd[1933716]: Invalid user bogdan from 2.139.220.30 port 56634
Jul 10 08:05:01 onepixel sshd[1933716]: Failed password for invalid user bogdan from 2.139.220.30 port 56634 ssh2
Jul 10 08:08:15 onepixel sshd[1935420]: Invalid user marla from 2.139.220.30 port 53702
2020-07-10 16:11:01
2.139.227.28 attackbotsspam
Unauthorized connection attempt detected from IP address 2.139.227.28 to port 1433
2020-06-13 06:04:52
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.139.22.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64392
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.139.22.53.			IN	A

;; AUTHORITY SECTION:
.			155	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 75 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 14:07:39 CST 2022
;; MSG SIZE  rcvd: 104
Host info
53.22.139.2.in-addr.arpa domain name pointer 53.red-2-139-22.dynamicip.rima-tde.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
53.22.139.2.in-addr.arpa	name = 53.red-2-139-22.dynamicip.rima-tde.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
68.183.230.27 attack
loopsrockreggae.com 68.183.230.27 \[02/Aug/2019:15:40:49 +0200\] "POST /wp-login.php HTTP/1.1" 200 5624 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
loopsrockreggae.com 68.183.230.27 \[02/Aug/2019:15:40:52 +0200\] "POST /wp-login.php HTTP/1.1" 200 5583 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-08-02 23:04:45
121.66.24.67 attackspam
Aug  2 17:42:26 srv-4 sshd\[8711\]: Invalid user admin from 121.66.24.67
Aug  2 17:42:26 srv-4 sshd\[8711\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.66.24.67
Aug  2 17:42:26 srv-4 sshd\[8713\]: Invalid user admin from 121.66.24.67
...
2019-08-02 22:44:50
201.6.99.139 attackbots
Aug  2 15:06:46 localhost sshd\[57724\]: Invalid user rafal from 201.6.99.139 port 42766
Aug  2 15:06:46 localhost sshd\[57724\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.6.99.139
...
2019-08-02 22:50:41
122.228.19.80 attackbots
02.08.2019 14:26:04 Connection to port 8834 blocked by firewall
2019-08-02 22:54:19
81.22.45.25 attackbots
08/02/2019-10:43:17.933376 81.22.45.25 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 79
2019-08-02 23:49:24
51.15.118.122 attackspam
Automatic report - Banned IP Access
2019-08-02 22:52:28
162.243.158.185 attack
Invalid user paintball1 from 162.243.158.185 port 49722
2019-08-02 22:25:44
157.48.28.49 attackbots
WordPress wp-login brute force :: 157.48.28.49 0.128 BYPASS [02/Aug/2019:18:43:17  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-08-02 22:57:16
106.12.215.125 attackspambots
Aug  2 12:08:04 lnxded64 sshd[2805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.215.125
2019-08-02 22:10:49
162.241.178.219 attackspambots
Fail2Ban Ban Triggered
2019-08-02 22:39:39
45.55.88.94 attackbots
" "
2019-08-02 23:06:19
2607:f298:5:110b::539:67dd attackbotsspam
WordPress wp-login brute force :: 2607:f298:5:110b::539:67dd 0.052 BYPASS [02/Aug/2019:18:42:14  1000] [censored_4] "POST /wp-login.php HTTP/1.1" 200 3989 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-08-02 23:32:30
79.124.24.120 attack
WordPress wp-login brute force :: 79.124.24.120 0.140 BYPASS [02/Aug/2019:18:43:33  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-08-02 22:45:39
153.92.126.196 attackbotsspam
Virus on IP !
2019-08-02 22:35:45
104.248.229.8 attackspam
Aug  1 14:27:04 srv1 sshd[32597]: Invalid user frida from 104.248.229.8
Aug  1 14:27:04 srv1 sshd[32597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.229.8 
Aug  1 14:27:06 srv1 sshd[32597]: Failed password for invalid user frida from 104.248.229.8 port 43890 ssh2
Aug  1 14:27:06 srv1 sshd[32597]: Received disconnect from 104.248.229.8: 11: Bye Bye [preauth]
Aug  1 14:36:52 srv1 sshd[1184]: Invalid user joseph from 104.248.229.8
Aug  1 14:36:52 srv1 sshd[1184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.229.8 
Aug  1 14:36:54 srv1 sshd[1184]: Failed password for invalid user joseph from 104.248.229.8 port 55354 ssh2
Aug  1 14:36:54 srv1 sshd[1184]: Received disconnect from 104.248.229.8: 11: Bye Bye [preauth]
Aug  1 14:41:01 srv1 sshd[1637]: Invalid user akbar from 104.248.229.8
Aug  1 14:41:01 srv1 sshd[1637]: pam_unix(sshd:auth): authentication failure; logname= ui........
-------------------------------
2019-08-02 22:36:39

Recently Reported IPs

113.116.106.238 41.222.172.56 39.60.23.34 77.65.11.58
114.227.117.69 182.117.20.243 222.220.95.42 194.195.246.214
112.239.103.104 45.226.48.61 93.142.199.232 186.176.60.251
103.87.25.171 47.145.151.33 2.50.138.58 173.63.39.192
139.59.132.146 91.183.81.82 49.142.208.132 36.133.128.40