Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Multicast Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 228.120.13.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 906
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;228.120.13.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020601 1800 900 604800 86400

;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 04:50:35 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 139.13.120.228.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.13.120.228.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
77.73.68.1 attack
web Attack on Website
2019-11-19 01:25:38
185.136.159.26 attackspam
Joomla User : try to access forms...
2019-11-19 01:44:46
178.128.234.2 attack
web Attack on Website
2019-11-19 01:31:48
103.233.123.1 attack
web Attack on Website
2019-11-19 01:32:23
211.23.61.194 attack
5x Failed Password
2019-11-19 01:36:50
192.34.61.4 attackbotsspam
SSH login attempts with user root.
2019-11-19 01:59:45
89.248.169.1 attack
web Attack on Website
2019-11-19 01:38:03
222.186.180.223 attackspambots
Nov 18 18:45:37 sd-53420 sshd\[27785\]: User root from 222.186.180.223 not allowed because none of user's groups are listed in AllowGroups
Nov 18 18:45:37 sd-53420 sshd\[27785\]: Failed none for invalid user root from 222.186.180.223 port 22218 ssh2
Nov 18 18:45:38 sd-53420 sshd\[27785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.223  user=root
Nov 18 18:45:39 sd-53420 sshd\[27785\]: Failed password for invalid user root from 222.186.180.223 port 22218 ssh2
Nov 18 18:45:42 sd-53420 sshd\[27785\]: Failed password for invalid user root from 222.186.180.223 port 22218 ssh2
...
2019-11-19 01:52:11
112.64.170.1 attack
SSH login attempts with user root.
2019-11-19 01:58:58
106.12.60.185 attackspambots
Nov 18 14:27:52 firewall sshd[15861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.60.185  user=root
Nov 18 14:27:54 firewall sshd[15861]: Failed password for root from 106.12.60.185 port 45138 ssh2
Nov 18 14:32:18 firewall sshd[15947]: Invalid user vcsa from 106.12.60.185
...
2019-11-19 02:01:02
134.175.121.1 attackspam
web Attack on Website
2019-11-19 01:30:36
220.134.32.7 attack
web Attack on Website
2019-11-19 01:24:25
190.0.22.7 attackspambots
web Attack on Website
2019-11-19 01:29:31
172.105.218.2 attackbotsspam
Brute-Force on ftp
2019-11-19 01:50:06
159.203.201.4 attackspambots
11/18/2019-18:14:24.804976 159.203.201.4 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-19 01:23:25

Recently Reported IPs

7.81.135.52 72.122.115.118 124.203.194.109 171.107.235.237
33.159.230.117 245.22.198.173 8.206.132.227 169.94.151.158
39.170.137.184 81.76.182.100 205.226.243.164 57.131.145.185
79.23.197.250 249.51.144.237 167.236.142.228 234.44.238.161
66.121.110.170 4.138.119.122 160.83.51.24 237.70.172.62