Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.139.15.193
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28640
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.139.15.193.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022802 1800 900 604800 86400

;; Query time: 49 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 11:33:38 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 193.15.139.21.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 193.15.139.21.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
120.157.111.176 attack
[H1] Blocked by UFW
2020-06-12 19:32:56
51.91.8.222 attackspambots
Jun 12 14:03:09 rotator sshd\[8600\]: Invalid user wanght from 51.91.8.222Jun 12 14:03:12 rotator sshd\[8600\]: Failed password for invalid user wanght from 51.91.8.222 port 51342 ssh2Jun 12 14:06:32 rotator sshd\[9368\]: Invalid user fonts from 51.91.8.222Jun 12 14:06:35 rotator sshd\[9368\]: Failed password for invalid user fonts from 51.91.8.222 port 51142 ssh2Jun 12 14:09:48 rotator sshd\[9397\]: Invalid user gd from 51.91.8.222Jun 12 14:09:50 rotator sshd\[9397\]: Failed password for invalid user gd from 51.91.8.222 port 50940 ssh2
...
2020-06-12 20:14:02
36.27.28.182 attackbotsspam
spam (f2b h2)
2020-06-12 19:47:38
69.250.156.161 attack
Brute-force attempt banned
2020-06-12 19:35:07
120.92.35.5 attackbots
Jun 12 05:55:47 gestao sshd[32758]: Failed password for lp from 120.92.35.5 port 61206 ssh2
Jun 12 06:00:03 gestao sshd[429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.35.5 
Jun 12 06:00:05 gestao sshd[429]: Failed password for invalid user admin from 120.92.35.5 port 48476 ssh2
...
2020-06-12 20:00:27
203.178.148.19 attack
srv02 Mass scanning activity detected Target: -  ..
2020-06-12 19:44:24
177.33.31.96 attack
Invalid user wuchunpeng from 177.33.31.96 port 55974
2020-06-12 19:39:59
46.38.150.153 attackbots
Jun 12 14:08:33 srv01 postfix/smtpd\[20700\]: warning: unknown\[46.38.150.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 12 14:08:50 srv01 postfix/smtpd\[21219\]: warning: unknown\[46.38.150.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 12 14:08:53 srv01 postfix/smtpd\[20700\]: warning: unknown\[46.38.150.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 12 14:09:39 srv01 postfix/smtpd\[20500\]: warning: unknown\[46.38.150.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 12 14:09:57 srv01 postfix/smtpd\[23139\]: warning: unknown\[46.38.150.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-12 20:10:00
62.102.148.68 attackspam
Jun 12 11:23:22 web8 sshd\[25285\]: Invalid user USERID from 62.102.148.68
Jun 12 11:23:23 web8 sshd\[25285\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.102.148.68
Jun 12 11:23:25 web8 sshd\[25285\]: Failed password for invalid user USERID from 62.102.148.68 port 58782 ssh2
Jun 12 11:24:49 web8 sshd\[26065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.102.148.68  user=root
Jun 12 11:24:51 web8 sshd\[26065\]: Failed password for root from 62.102.148.68 port 39966 ssh2
2020-06-12 19:36:42
2a00:d680:20:50::42 attackbotsspam
ENG,WP GET /2020/wp-login.php
2020-06-12 19:55:19
78.16.149.169 attackbots
Invalid user debug from 78.16.149.169 port 51258
2020-06-12 19:47:09
193.27.228.145 attackbots
06/12/2020-05:40:02.022664 193.27.228.145 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-12 19:54:48
37.187.12.126 attack
Jun 12 11:14:38 Ubuntu-1404-trusty-64-minimal sshd\[1260\]: Invalid user kt from 37.187.12.126
Jun 12 11:14:38 Ubuntu-1404-trusty-64-minimal sshd\[1260\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.12.126
Jun 12 11:14:40 Ubuntu-1404-trusty-64-minimal sshd\[1260\]: Failed password for invalid user kt from 37.187.12.126 port 42786 ssh2
Jun 12 11:25:36 Ubuntu-1404-trusty-64-minimal sshd\[7187\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.12.126  user=root
Jun 12 11:25:37 Ubuntu-1404-trusty-64-minimal sshd\[7187\]: Failed password for root from 37.187.12.126 port 43152 ssh2
2020-06-12 19:38:53
146.185.180.60 attackspambots
<6 unauthorized SSH connections
2020-06-12 19:59:02
51.161.70.126 attackspambots
DATE:2020-06-12 14:09:56, IP:51.161.70.126, PORT:ssh SSH brute force auth (docker-dc)
2020-06-12 20:10:54

Recently Reported IPs

170.94.157.150 223.26.239.190 190.139.116.55 7.188.165.114
167.120.250.49 237.177.86.121 81.229.82.105 38.108.153.247
97.0.19.241 175.69.157.154 28.72.224.60 55.5.228.106
233.227.134.120 187.254.143.22 138.8.8.178 146.44.138.83
60.15.124.195 251.172.54.79 213.229.181.32 55.64.72.224