Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Spain

Internet Service Provider: Telefonica de Espana Sau

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attack
Unauthorized connection attempt detected from IP address 2.139.234.30 to port 8080 [J]
2020-01-31 03:05:43
attackbots
Unauthorized connection attempt detected from IP address 2.139.234.30 to port 80 [J]
2020-01-06 17:18:44
attack
Automatic report - Banned IP Access
2019-11-19 05:32:24
Comments on same subnet:
IP Type Details Datetime
2.139.234.1 attackbots
$f2bV_matches
2020-01-13 22:53:33
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.139.234.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16407
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.139.234.30.			IN	A

;; AUTHORITY SECTION:
.			464	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019111801 1800 900 604800 86400

;; Query time: 120 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Nov 19 05:32:21 CST 2019
;; MSG SIZE  rcvd: 116
Host info
30.234.139.2.in-addr.arpa domain name pointer 30.red-2-139-234.staticip.rima-tde.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
30.234.139.2.in-addr.arpa	name = 30.red-2-139-234.staticip.rima-tde.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
177.137.168.158 attack
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2020-05-16 12:41:26
112.196.97.85 attackspambots
Fail2Ban - SSH Bruteforce Attempt
2020-05-16 12:08:29
222.186.31.166 attackbotsspam
2020-05-16T04:59:34.924147centos sshd[11548]: Failed password for root from 222.186.31.166 port 47739 ssh2
2020-05-16T04:59:38.799623centos sshd[11548]: Failed password for root from 222.186.31.166 port 47739 ssh2
2020-05-16T04:59:41.833109centos sshd[11548]: Failed password for root from 222.186.31.166 port 47739 ssh2
...
2020-05-16 12:28:39
49.234.87.24 attackbots
Invalid user wangk from 49.234.87.24 port 35544
2020-05-16 12:13:36
95.167.139.66 attackspambots
Invalid user eat from 95.167.139.66 port 41199
2020-05-16 12:16:53
106.13.174.144 attack
...
2020-05-16 12:26:51
185.220.101.202 attack
SSH brutforce
2020-05-16 12:10:34
197.253.19.74 attack
May 15 22:39:06 ny01 sshd[32755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.253.19.74
May 15 22:39:08 ny01 sshd[32755]: Failed password for invalid user contador from 197.253.19.74 port 36985 ssh2
May 15 22:43:00 ny01 sshd[851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.253.19.74
2020-05-16 12:05:20
222.186.173.183 attack
May 16 04:44:21 eventyay sshd[19501]: Failed password for root from 222.186.173.183 port 11288 ssh2
May 16 04:44:33 eventyay sshd[19501]: error: maximum authentication attempts exceeded for root from 222.186.173.183 port 11288 ssh2 [preauth]
May 16 04:44:38 eventyay sshd[19504]: Failed password for root from 222.186.173.183 port 14284 ssh2
...
2020-05-16 12:24:50
52.130.85.229 attackbotsspam
May 16 01:07:36 vpn01 sshd[28668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.130.85.229
May 16 01:07:38 vpn01 sshd[28668]: Failed password for invalid user test from 52.130.85.229 port 60024 ssh2
...
2020-05-16 12:17:09
75.109.235.58 attackspam
[ 🇳🇱 ] REQUEST: /cgi-bin/mainfunction.cgi
2020-05-16 12:14:28
49.145.233.9 attackbots
Wordpress login attempts
2020-05-16 12:10:04
45.124.86.130 attackspambots
CMS (WordPress or Joomla) login attempt.
2020-05-16 12:28:57
163.44.150.247 attack
SSH-BruteForce
2020-05-16 12:06:45
40.121.18.230 attackspambots
May 15 22:43:15 ny01 sshd[922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.121.18.230
May 15 22:43:18 ny01 sshd[922]: Failed password for invalid user arfan from 40.121.18.230 port 50200 ssh2
May 15 22:47:14 ny01 sshd[1504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.121.18.230
2020-05-16 12:22:24

Recently Reported IPs

161.142.228.25 36.81.6.101 18.21.219.223 125.24.115.28
152.234.182.65 58.122.1.56 200.150.176.212 34.16.92.17
162.50.230.53 203.212.189.192 11.230.194.135 205.114.131.202
54.148.3.123 23.94.81.50 14.162.207.87 49.231.190.146
211.23.139.43 190.75.22.75 95.30.166.206 176.43.218.188