Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.64.155.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29306
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.64.155.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 13:32:52 CST 2025
;; MSG SIZE  rcvd: 105
Host info
139.155.64.2.in-addr.arpa domain name pointer 2.64.155.139.mobile.tre.se.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.155.64.2.in-addr.arpa	name = 2.64.155.139.mobile.tre.se.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
183.136.206.205 attack
Invalid user odoo from 183.136.206.205 port 46088
2020-04-30 03:14:49
212.95.137.164 attackspambots
Apr 29 19:21:58 Ubuntu-1404-trusty-64-minimal sshd\[7831\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.95.137.164  user=root
Apr 29 19:21:59 Ubuntu-1404-trusty-64-minimal sshd\[7831\]: Failed password for root from 212.95.137.164 port 58182 ssh2
Apr 29 20:16:51 Ubuntu-1404-trusty-64-minimal sshd\[20603\]: Invalid user ubuntu from 212.95.137.164
Apr 29 20:16:51 Ubuntu-1404-trusty-64-minimal sshd\[20603\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.95.137.164
Apr 29 20:16:54 Ubuntu-1404-trusty-64-minimal sshd\[20603\]: Failed password for invalid user ubuntu from 212.95.137.164 port 43466 ssh2
2020-04-30 02:47:59
203.190.55.213 attackbotsspam
Invalid user ntp from 203.190.55.213 port 42205
2020-04-30 03:11:12
177.128.104.207 attackbots
Invalid user ridzwan from 177.128.104.207 port 57594
2020-04-30 03:16:58
198.12.92.195 attackbots
SSH brute-force attempt
2020-04-30 03:12:01
62.104.16.224 attack
2020-04-29T17:59:04.318865  sshd[30749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.104.16.224  user=root
2020-04-29T17:59:06.359852  sshd[30749]: Failed password for root from 62.104.16.224 port 38390 ssh2
2020-04-29T18:02:39.878738  sshd[30846]: Invalid user farooq from 62.104.16.224 port 46498
...
2020-04-30 03:04:08
154.66.219.20 attack
Repeated brute force against a port
2020-04-30 02:52:59
180.76.175.211 attack
Failed password for root from 180.76.175.211 port 54308 ssh2
2020-04-30 03:15:46
212.64.29.136 attackspam
Apr 29 09:09:36 ny01 sshd[25083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.29.136
Apr 29 09:09:38 ny01 sshd[25083]: Failed password for invalid user fabian from 212.64.29.136 port 57680 ssh2
Apr 29 09:12:08 ny01 sshd[25395]: Failed password for root from 212.64.29.136 port 59402 ssh2
2020-04-30 02:48:11
80.211.60.125 attackbotsspam
$f2bV_matches
2020-04-30 02:42:14
178.62.198.142 attackspambots
Fail2Ban Ban Triggered
2020-04-30 03:16:24
49.233.170.155 attackspam
Failed password for postgres from 49.233.170.155 port 38810 ssh2
2020-04-30 03:04:46
118.25.21.176 attackspambots
Apr 29 18:05:44 *** sshd[32096]: Invalid user default from 118.25.21.176
2020-04-30 02:56:13
139.59.2.181 attackbotsspam
200428 20:40:49 [Warning] Access denied for user 'wp_db'@'139.59.2.181' (using password: YES)
200429  2:39:14 [Warning] Access denied for user 'root'@'139.59.2.181' (using password: YES)
200429 14:15:11 [Warning] Access denied for user 'root'@'139.59.2.181' (using password: YES)
...
2020-04-30 02:54:00
91.121.221.195 attackspambots
odoo8
...
2020-04-30 03:00:43

Recently Reported IPs

240.160.2.193 148.102.198.183 203.173.64.197 17.121.253.108
55.238.90.43 213.45.17.91 151.220.224.157 150.108.239.241
175.228.47.223 108.175.249.6 113.43.160.152 56.26.28.91
75.245.58.194 198.38.248.84 19.19.52.68 133.85.58.227
68.190.21.3 155.253.123.82 32.159.217.208 138.70.220.251