Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 39.113.136.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34793
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;39.113.136.139.			IN	A

;; AUTHORITY SECTION:
.			595	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011001 1800 900 604800 86400

;; Query time: 76 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 05:09:17 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 139.136.113.39.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.136.113.39.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
139.59.10.186 attackbotsspam
Jun 26 09:24:05 dhoomketu sshd[1045735]: Invalid user ttest from 139.59.10.186 port 58452
Jun 26 09:24:05 dhoomketu sshd[1045735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.10.186 
Jun 26 09:24:05 dhoomketu sshd[1045735]: Invalid user ttest from 139.59.10.186 port 58452
Jun 26 09:24:07 dhoomketu sshd[1045735]: Failed password for invalid user ttest from 139.59.10.186 port 58452 ssh2
Jun 26 09:27:01 dhoomketu sshd[1045756]: Invalid user pankaj from 139.59.10.186 port 48164
...
2020-06-26 12:02:14
60.249.216.153 attack
Honeypot attack, port: 81, PTR: 60-249-216-153.HINET-IP.hinet.net.
2020-06-26 09:13:22
138.197.15.40 attackspambots
Brute force attempt
2020-06-26 09:15:21
190.201.67.97 attackspambots
Unauthorized connection attempt from IP address 190.201.67.97 on Port 445(SMB)
2020-06-26 08:59:52
112.121.153.187 attack
Automatic report - XMLRPC Attack
2020-06-26 09:08:36
36.154.37.194 attackspam
Port scan: Attack repeated for 24 hours
2020-06-26 09:13:39
189.90.66.5 attackbotsspam
SSH-BruteForce
2020-06-26 09:07:45
112.85.42.188 attackbots
06/25/2020-20:51:11.079669 112.85.42.188 Protocol: 6 ET SCAN Potential SSH Scan
2020-06-26 08:53:30
103.233.5.24 attackspambots
Jun 26 01:57:57 rotator sshd\[13712\]: Invalid user administrador from 103.233.5.24Jun 26 01:58:00 rotator sshd\[13712\]: Failed password for invalid user administrador from 103.233.5.24 port 21738 ssh2Jun 26 02:00:41 rotator sshd\[14503\]: Invalid user di from 103.233.5.24Jun 26 02:00:44 rotator sshd\[14503\]: Failed password for invalid user di from 103.233.5.24 port 26845 ssh2Jun 26 02:03:20 rotator sshd\[14528\]: Invalid user sanchit from 103.233.5.24Jun 26 02:03:21 rotator sshd\[14528\]: Failed password for invalid user sanchit from 103.233.5.24 port 16013 ssh2
...
2020-06-26 08:45:48
164.132.44.25 attack
Scanned 3 times in the last 24 hours on port 22
2020-06-26 09:14:28
14.242.250.86 attackbots
445/tcp
[2020-06-25]1pkt
2020-06-26 09:10:48
52.154.72.37 attackspam
SSH authentication failure x 6 reported by Fail2Ban
...
2020-06-26 08:47:33
176.31.134.74 attack
Automatic report - XMLRPC Attack
2020-06-26 09:12:41
185.132.53.115 attack
Jun 25 12:05:17 XXX sshd[5942]: Invalid user ubnt from 185.132.53.115 port 48534
2020-06-26 08:52:00
70.55.59.249 attack
 TCP (SYN) 70.55.59.249:48730 -> port 22, len 60
2020-06-26 09:03:08

Recently Reported IPs

204.226.145.9 156.142.134.169 209.202.134.13 159.98.223.171
61.187.124.126 192.165.163.180 103.143.60.246 172.161.32.162
183.47.59.217 192.44.225.114 230.154.153.250 250.221.157.137
183.77.102.233 112.193.219.225 74.12.144.219 143.209.233.144
195.189.2.190 115.24.47.2 228.172.74.164 110.249.132.122