Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 10.139.195.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48289
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;10.139.195.71.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025091101 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 12 12:25:44 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 71.195.139.10.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 71.195.139.10.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
34.87.213.57 attackbotsspam
9200/tcp 873/tcp...
[2020-07-09/20]4pkt,2pt.(tcp)
2020-07-21 02:07:00
159.89.170.154 attackspambots
Jul 20 13:48:30 firewall sshd[23871]: Invalid user hk from 159.89.170.154
Jul 20 13:48:32 firewall sshd[23871]: Failed password for invalid user hk from 159.89.170.154 port 57114 ssh2
Jul 20 13:53:11 firewall sshd[24007]: Invalid user test from 159.89.170.154
...
2020-07-21 02:07:38
115.182.8.30 attack
1433/tcp 1433/tcp 1433/tcp...
[2020-05-20/07-20]16pkt,1pt.(tcp)
2020-07-21 01:55:27
112.49.38.5 attackspambots
Failed password for invalid user informix from 112.49.38.5 port 59952 ssh2
2020-07-21 01:44:26
113.141.166.40 attackbots
"fail2ban match"
2020-07-21 02:01:48
106.13.93.199 attackbots
Jul 20 10:08:06 dignus sshd[22372]: Failed password for invalid user erp from 106.13.93.199 port 46524 ssh2
Jul 20 10:10:03 dignus sshd[22578]: Invalid user user2 from 106.13.93.199 port 39712
Jul 20 10:10:03 dignus sshd[22578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.93.199
Jul 20 10:10:05 dignus sshd[22578]: Failed password for invalid user user2 from 106.13.93.199 port 39712 ssh2
Jul 20 10:11:56 dignus sshd[22810]: Invalid user zero from 106.13.93.199 port 32900
...
2020-07-21 01:34:54
62.234.17.74 attack
Jul 20 15:01:59 fhem-rasp sshd[12434]: Invalid user xue from 62.234.17.74 port 57288
...
2020-07-21 01:31:45
185.200.118.56 attackspam
 TCP (SYN) 185.200.118.56:47749 -> port 1723, len 44
2020-07-21 01:36:49
117.89.172.66 attack
Jul 20 13:46:10 zimbra sshd[28697]: Invalid user halley from 117.89.172.66
Jul 20 13:46:10 zimbra sshd[28697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.89.172.66
Jul 20 13:46:12 zimbra sshd[28697]: Failed password for invalid user halley from 117.89.172.66 port 34178 ssh2
Jul 20 13:46:12 zimbra sshd[28697]: Received disconnect from 117.89.172.66 port 34178:11: Bye Bye [preauth]
Jul 20 13:46:12 zimbra sshd[28697]: Disconnected from 117.89.172.66 port 34178 [preauth]
Jul 20 13:59:38 zimbra sshd[9365]: Invalid user alfresco from 117.89.172.66
Jul 20 13:59:38 zimbra sshd[9365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.89.172.66
Jul 20 13:59:40 zimbra sshd[9365]: Failed password for invalid user alfresco from 117.89.172.66 port 35948 ssh2
Jul 20 13:59:40 zimbra sshd[9365]: Received disconnect from 117.89.172.66 port 35948:11: Bye Bye [preauth]
Jul 20 13:59:40 zimbra sshd[936........
-------------------------------
2020-07-21 01:47:11
119.28.238.101 attack
2020-07-20T17:48:58.052386lavrinenko.info sshd[10789]: Failed password for mysql from 119.28.238.101 port 56548 ssh2
2020-07-20T17:52:09.523125lavrinenko.info sshd[10888]: Invalid user gera from 119.28.238.101 port 44732
2020-07-20T17:52:09.532466lavrinenko.info sshd[10888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.238.101
2020-07-20T17:52:09.523125lavrinenko.info sshd[10888]: Invalid user gera from 119.28.238.101 port 44732
2020-07-20T17:52:11.362844lavrinenko.info sshd[10888]: Failed password for invalid user gera from 119.28.238.101 port 44732 ssh2
...
2020-07-21 02:01:31
202.51.74.92 attackspambots
Brute force SMTP login attempted.
...
2020-07-21 01:41:04
134.209.173.240 attackbotsspam
DATE:2020-07-20 18:39:00, IP:134.209.173.240, PORT:5900 VNC brute force auth on honeypot server (epe-honey1-hq)
2020-07-21 01:37:23
61.83.175.16 attackbotsspam
Jul 20 13:10:59 db02 sshd[3035]: Invalid user admin from 61.83.175.16
Jul 20 13:10:59 db02 sshd[3035]: Received disconnect from 61.83.175.16: 11: Bye Bye [preauth]
Jul 20 13:11:01 db02 sshd[3037]: User r.r from 61.83.175.16 not allowed because none of user's groups are listed in AllowGroups
Jul 20 13:11:02 db02 sshd[3037]: Received disconnect from 61.83.175.16: 11: Bye Bye [preauth]
Jul 20 13:11:04 db02 sshd[3040]: Invalid user admin from 61.83.175.16


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=61.83.175.16
2020-07-21 01:35:29
186.147.129.110 attack
Jul 20 16:02:59 ns381471 sshd[20456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.147.129.110
Jul 20 16:03:02 ns381471 sshd[20456]: Failed password for invalid user eveline from 186.147.129.110 port 53950 ssh2
2020-07-21 02:03:20
92.81.25.76 attackbots
5500/tcp 5500/tcp
[2020-06-28/07-20]2pkt
2020-07-21 01:59:58

Recently Reported IPs

223.104.69.33 139.155.139.22 45.67.138.250 135.119.112.115
113.192.61.167 100.26.146.146 100.24.32.48 10.236.81.200
92.72.47.30 20.12.241.3 176.58.105.114 38.146.29.154
10.69.78.72 35.203.211.52 170.106.35.137 114.215.252.126
10.134.73.186 42.238.199.96 222.79.104.23 171.213.190.33