Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 231.139.180.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34394
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;231.139.180.34.			IN	A

;; AUTHORITY SECTION:
.			392	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022041401 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 15 08:44:22 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 34.180.139.231.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 34.180.139.231.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.13.37.213 attackbotsspam
IP blocked
2020-06-20 02:54:18
196.52.84.29 attack
Automatic report - Banned IP Access
2020-06-20 02:50:15
182.246.242.205 attack
RDP Bruteforce
2020-06-20 02:48:16
195.62.14.4 attack
$f2bV_matches
2020-06-20 03:12:42
80.241.46.6 attack
Invalid user user from 80.241.46.6 port 6976
2020-06-20 03:21:31
81.129.192.250 attackspambots
[portscan] tcp/22 [SSH]
in blocklist.de:'listed [ssh]'
*(RWIN=65535)(06191618)
2020-06-20 02:47:39
112.85.42.178 attackbotsspam
Jun 19 21:08:44 pve1 sshd[7479]: Failed password for root from 112.85.42.178 port 18520 ssh2
Jun 19 21:08:48 pve1 sshd[7479]: Failed password for root from 112.85.42.178 port 18520 ssh2
...
2020-06-20 03:09:08
8.9.4.175 attackbotsspam
RDP Bruteforce
2020-06-20 02:56:24
60.249.82.121 attackspambots
2020-06-19T20:51:41.9842291240 sshd\[20712\]: Invalid user lzb from 60.249.82.121 port 45020
2020-06-19T20:51:41.9882571240 sshd\[20712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.249.82.121
2020-06-19T20:51:44.5061451240 sshd\[20712\]: Failed password for invalid user lzb from 60.249.82.121 port 45020 ssh2
...
2020-06-20 03:03:08
168.103.47.81 attackspambots
Invalid user fernanda from 168.103.47.81 port 56654
2020-06-20 03:13:16
92.38.21.241 attackspambots
1592568738 - 06/19/2020 14:12:18 Host: 92.38.21.241/92.38.21.241 Port: 445 TCP Blocked
2020-06-20 03:04:28
124.114.128.90 attackbotsspam
Brute forcing RDP port 3389
2020-06-20 03:16:16
195.154.29.107 attackbotsspam
xmlrpc attack
2020-06-20 03:08:19
222.186.15.62 attack
Jun 19 19:07:51 ip-172-31-61-156 sshd[10957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.62  user=root
Jun 19 19:07:52 ip-172-31-61-156 sshd[10957]: Failed password for root from 222.186.15.62 port 16801 ssh2
...
2020-06-20 03:14:35
111.229.116.227 attack
Jun 19 13:15:45 jumpserver sshd[142343]: Invalid user dennis from 111.229.116.227 port 56336
Jun 19 13:15:47 jumpserver sshd[142343]: Failed password for invalid user dennis from 111.229.116.227 port 56336 ssh2
Jun 19 13:19:24 jumpserver sshd[142390]: Invalid user epg from 111.229.116.227 port 43800
...
2020-06-20 03:14:53

Recently Reported IPs

144.250.115.65 254.136.23.58 212.237.123.109 8.4.94.114
29.115.201.50 211.221.198.21 81.178.171.172 213.226.212.12
93.222.167.2 42.155.53.119 123.248.158.252 56.195.40.84
174.253.83.133 85.118.94.5 229.178.132.242 20.180.142.234
26.183.67.50 34.137.166.236 2a04:2417:4800:7780:d51e:93ab:8df2:7150 191.0.19.129