Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Reserved

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 225.13.228.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50773
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;225.13.228.139.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061000 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jun 10 22:58:15 CST 2019
;; MSG SIZE  rcvd: 118

Host info
Host 139.228.13.225.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 139.228.13.225.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
198.27.90.106 attackspambots
$f2bV_matches
2020-07-01 22:56:02
60.191.223.52 attackbots
Brute-Force
2020-07-01 22:13:25
123.30.236.149 attackbots
Jun 30 19:07:31 sip sshd[24040]: Failed password for root from 123.30.236.149 port 64996 ssh2
Jun 30 19:23:07 sip sshd[29948]: Failed password for root from 123.30.236.149 port 38028 ssh2
Jun 30 19:26:48 sip sshd[31347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.236.149
2020-07-01 22:37:19
106.13.160.127 attackbots
Multiple SSH authentication failures from 106.13.160.127
2020-07-01 22:20:29
103.254.69.246 attackbotsspam
Unauthorized connection attempt from IP address 103.254.69.246 on Port 445(SMB)
2020-07-01 22:44:15
46.38.150.142 attack
Too many connections or unauthorized access detected from Yankee banned ip
2020-07-01 22:01:20
106.12.119.218 attackbotsspam
Jun 30 12:43:38 ip-172-31-62-245 sshd\[9120\]: Invalid user admin from 106.12.119.218\
Jun 30 12:43:40 ip-172-31-62-245 sshd\[9120\]: Failed password for invalid user admin from 106.12.119.218 port 54400 ssh2\
Jun 30 12:44:28 ip-172-31-62-245 sshd\[9131\]: Invalid user nlu from 106.12.119.218\
Jun 30 12:44:29 ip-172-31-62-245 sshd\[9131\]: Failed password for invalid user nlu from 106.12.119.218 port 36172 ssh2\
Jun 30 12:45:23 ip-172-31-62-245 sshd\[9142\]: Invalid user pi from 106.12.119.218\
2020-07-01 22:57:33
47.22.82.8 attackspam
Multiple SSH authentication failures from 47.22.82.8
2020-07-01 22:42:48
88.214.26.93 attackbots
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-06-30T18:13:47Z and 2020-06-30T19:24:49Z
2020-07-01 22:37:50
122.51.142.72 attackspam
2020-06-30T15:35:12.082984ollin.zadara.org sshd[479156]: Invalid user support from 122.51.142.72 port 55295
2020-06-30T15:35:13.919570ollin.zadara.org sshd[479156]: Failed password for invalid user support from 122.51.142.72 port 55295 ssh2
...
2020-07-01 23:00:02
211.220.0.117 attackbots
Unauthorized connection attempt detected from IP address 211.220.0.117 to port 80
2020-07-01 22:18:59
178.62.110.145 attack
Tried to find non-existing directory/file on the server
2020-07-01 22:12:06
5.135.94.191 attack
Jun 30 20:28:24 mout sshd[6187]: Invalid user student from 5.135.94.191 port 34154
2020-07-01 22:25:29
40.117.97.218 attackspambots
SSH Brute-Force attacks
2020-07-01 22:38:33
222.252.50.199 attack
...
2020-07-01 22:21:30

Recently Reported IPs

49.50.111.115 128.234.97.39 127.115.237.46 83.164.240.237
190.221.166.103 138.133.177.78 112.35.9.98 218.14.54.201
179.111.240.140 157.45.82.255 70.89.68.235 187.74.233.208
138.186.91.68 185.40.4.159 218.94.136.90 179.192.105.159
208.64.33.123 185.100.87.129 200.59.236.202 86.16.186.4