Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bennekom

Region: Gelderland

Country: The Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
213.136.248.70 attack
Jan 16 21:00:53 ms-srv sshd[7863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.136.248.70
Jan 16 21:00:55 ms-srv sshd[7863]: Failed password for invalid user erica from 213.136.248.70 port 46912 ssh2
2020-03-09 01:07:24
213.136.248.70 attackbotsspam
Unauthorized connection attempt detected from IP address 213.136.248.70 to port 2220 [J]
2020-01-19 03:39:24
213.136.248.70 attack
Invalid user hs from 213.136.248.70 port 46726
2020-01-17 04:26:47
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.136.2.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8546
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.136.2.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031401 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 15 13:21:30 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 139.2.136.213.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.2.136.213.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
36.57.88.53 attackbotsspam
Aug  4 21:14:57 srv01 postfix/smtpd\[9579\]: warning: unknown\[36.57.88.53\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  4 21:15:09 srv01 postfix/smtpd\[9579\]: warning: unknown\[36.57.88.53\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  4 21:15:25 srv01 postfix/smtpd\[9579\]: warning: unknown\[36.57.88.53\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  4 21:15:44 srv01 postfix/smtpd\[9579\]: warning: unknown\[36.57.88.53\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  4 21:15:56 srv01 postfix/smtpd\[9579\]: warning: unknown\[36.57.88.53\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-05 08:08:17
194.26.29.142 attackspam
ET DROP Dshield Block Listed Source group 1 - port: 9000 proto: tcp cat: Misc Attackbytes: 60
2020-08-05 08:12:24
183.90.171.171 attackspambots
Hit honeypot r.
2020-08-05 07:47:59
94.102.49.159 attackspambots
Aug502:03:44server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=94.102.49.159DST=136.243.224.52LEN=40TOS=0x00PREC=0x00TTL=249ID=40644PROTO=TCPSPT=57709DPT=17638WINDOW=1024RES=0x00SYNURGP=0Aug502:03:58server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=94.102.49.159DST=136.243.224.56LEN=40TOS=0x00PREC=0x00TTL=249ID=25432PROTO=TCPSPT=57709DPT=17373WINDOW=1024RES=0x00SYNURGP=0Aug502:04:01server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=94.102.49.159DST=136.243.224.56LEN=40TOS=0x00PREC=0x00TTL=249ID=16205PROTO=TCPSPT=57709DPT=17851WINDOW=1024RES=0x00SYNURGP=0Aug502:04:01server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=94.102.49.159DST=136.243.224.55LEN=40TOS=0x00PREC=0x00TTL=249ID=40984PROTO=TCPSPT=57709DPT=15255WINDOW=1024RES=0x00SYNURGP=0Aug502:04:03server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7
2020-08-05 08:09:22
58.33.35.82 attack
Failed password for root from 58.33.35.82 port 4704 ssh2
2020-08-05 08:03:43
209.65.68.190 attackspambots
Aug  4 20:55:19 sso sshd[8795]: Failed password for root from 209.65.68.190 port 55113 ssh2
...
2020-08-05 08:10:28
174.219.7.144 attackbots
Brute forcing email accounts
2020-08-05 07:53:50
203.142.81.166 attackbots
Aug  4 21:07:48 ip106 sshd[4287]: Failed password for root from 203.142.81.166 port 60032 ssh2
...
2020-08-05 08:11:33
106.52.106.61 attackspam
Aug  5 01:53:04 fhem-rasp sshd[8781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.106.61  user=root
Aug  5 01:53:05 fhem-rasp sshd[8781]: Failed password for root from 106.52.106.61 port 40134 ssh2
...
2020-08-05 08:02:32
193.27.229.17 attackbotsspam
3389BruteforceStormFW22
2020-08-05 08:05:36
104.140.188.30 attack
GPL SNMP public access udp - port: 161 proto: snmp cat: Attempted Information Leakbytes: 85
2020-08-05 08:06:23
139.170.150.252 attackbots
Aug  4 21:22:40 localhost sshd\[8545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.170.150.252  user=root
Aug  4 21:22:42 localhost sshd\[8545\]: Failed password for root from 139.170.150.252 port 14004 ssh2
Aug  4 21:32:23 localhost sshd\[8700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.170.150.252  user=root
...
2020-08-05 07:49:01
67.209.185.218 attack
Aug  4 16:09:53 propaganda sshd[80502]: Connection from 67.209.185.218 port 54000 on 10.0.0.160 port 22 rdomain ""
Aug  4 16:09:54 propaganda sshd[80502]: Connection closed by 67.209.185.218 port 54000 [preauth]
2020-08-05 08:12:11
113.161.53.147 attackspambots
Aug  5 01:39:26 v22019038103785759 sshd\[15779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.161.53.147  user=root
Aug  5 01:39:27 v22019038103785759 sshd\[15779\]: Failed password for root from 113.161.53.147 port 57269 ssh2
Aug  5 01:42:25 v22019038103785759 sshd\[15850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.161.53.147  user=root
Aug  5 01:42:28 v22019038103785759 sshd\[15850\]: Failed password for root from 113.161.53.147 port 47961 ssh2
Aug  5 01:45:36 v22019038103785759 sshd\[16026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.161.53.147  user=root
...
2020-08-05 07:50:28
49.234.122.94 attackspam
Aug  4 15:43:57 ny01 sshd[16826]: Failed password for root from 49.234.122.94 port 46968 ssh2
Aug  4 15:46:34 ny01 sshd[17146]: Failed password for root from 49.234.122.94 port 47506 ssh2
2020-08-05 08:16:21

Recently Reported IPs

0.244.90.81 163.221.52.78 131.196.181.10 241.124.204.216
168.97.10.179 217.231.239.95 194.189.96.91 219.11.137.212
226.0.214.241 58.154.84.89 37.32.182.8 89.227.56.231
128.240.214.96 80.49.194.194 206.73.9.26 244.207.170.33
53.130.98.32 217.33.9.27 133.176.179.125 26.53.12.98