Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kirkland

Region: Washington

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Allstream Business US, LLC

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 67.136.222.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43561
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;67.136.222.139.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019072700 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jul 28 00:43:13 CST 2019
;; MSG SIZE  rcvd: 118
Host info
139.222.136.67.in-addr.arpa has no PTR record
Nslookup info:
;; Got SERVFAIL reply from 67.207.67.2, trying next server
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 139.222.136.67.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
104.248.192.145 attackspam
2020-03-20T22:57:09.840466suse-nuc sshd[12684]: Invalid user kalea from 104.248.192.145 port 45588
...
2020-03-21 18:45:28
91.103.27.235 attack
Mar 21 09:58:00 xeon sshd[3489]: Failed password for invalid user gg from 91.103.27.235 port 43092 ssh2
2020-03-21 18:55:53
1.0.153.206 attackspam
$f2bV_matches
2020-03-21 18:16:47
49.233.132.81 attackspam
Mar 21 08:11:48 work-partkepr sshd\[30724\]: Invalid user riann from 49.233.132.81 port 33356
Mar 21 08:11:48 work-partkepr sshd\[30724\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.132.81
...
2020-03-21 18:46:52
122.51.71.156 attackbotsspam
Invalid user italo from 122.51.71.156 port 58612
2020-03-21 18:33:39
106.13.72.190 attack
2020-03-21T10:12:11.796198shield sshd\[30226\]: Invalid user temp1 from 106.13.72.190 port 54684
2020-03-21T10:12:11.805869shield sshd\[30226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.72.190
2020-03-21T10:12:13.855998shield sshd\[30226\]: Failed password for invalid user temp1 from 106.13.72.190 port 54684 ssh2
2020-03-21T10:15:30.941915shield sshd\[30594\]: Invalid user stuttgart from 106.13.72.190 port 44058
2020-03-21T10:15:30.951000shield sshd\[30594\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.72.190
2020-03-21 18:35:33
212.64.8.10 attack
Mar 21 11:06:48 jane sshd[11640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.8.10 
Mar 21 11:06:50 jane sshd[11640]: Failed password for invalid user mr from 212.64.8.10 port 43484 ssh2
...
2020-03-21 18:22:45
51.77.52.160 attackbots
Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools
2020-03-21 18:47:42
45.224.105.209 attack
(imapd) Failed IMAP login from 45.224.105.209 (AR/Argentina/-): 1 in the last 3600 secs
2020-03-21 18:40:28
81.133.142.45 attackspambots
Mar 21 09:22:58 haigwepa sshd[8216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.133.142.45 
Mar 21 09:23:00 haigwepa sshd[8216]: Failed password for invalid user wpyan from 81.133.142.45 port 59658 ssh2
...
2020-03-21 18:44:48
113.6.248.162 attackspam
[MK-VM4] Blocked by UFW
2020-03-21 18:54:36
34.80.135.20 attackbotsspam
Invalid user laurel from 34.80.135.20 port 40520
2020-03-21 18:14:54
129.28.165.178 attack
SSH invalid-user multiple login try
2020-03-21 18:47:19
207.46.13.182 attackspambots
Too many 404s, searching for vulnerabilities
2020-03-21 18:31:41
218.92.0.168 attackspambots
2020-03-21T10:23:03.919378homeassistant sshd[19579]: Failed none for root from 218.92.0.168 port 28985 ssh2
2020-03-21T10:23:04.176571homeassistant sshd[19579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.168  user=root
...
2020-03-21 18:30:10

Recently Reported IPs

89.179.111.232 77.87.183.69 78.14.174.102 100.199.119.115
121.247.251.176 174.137.94.83 205.161.102.165 103.193.90.75
137.195.88.9 207.180.252.188 45.172.89.170 99.173.3.150
72.18.240.216 45.118.205.254 179.183.245.229 152.26.132.204
187.87.2.202 148.253.144.60 182.177.128.135 103.235.197.45