Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.67.139.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54697
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;102.67.139.69.			IN	A

;; AUTHORITY SECTION:
.			597	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100602 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 07 06:02:37 CST 2022
;; MSG SIZE  rcvd: 106
Host info
69.139.67.102.in-addr.arpa domain name pointer edgeserv-cpt-1.vm.edge.capetown.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
69.139.67.102.in-addr.arpa	name = edgeserv-cpt-1.vm.edge.capetown.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
94.177.213.167 attackspambots
Oct 22 05:51:03 ns381471 sshd[21750]: Failed password for root from 94.177.213.167 port 59726 ssh2
Oct 22 05:54:49 ns381471 sshd[21875]: Failed password for root from 94.177.213.167 port 42082 ssh2
2019-10-22 12:02:57
192.236.160.165 attackbotsspam
2019-10-22T11:16:02.499179enmeeting.mahidol.ac.th sshd\[5351\]: Invalid user ubnt from 192.236.160.165 port 38266
2019-10-22T11:16:02.519707enmeeting.mahidol.ac.th sshd\[5351\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=hwsrv-622636.hostwindsdns.com
2019-10-22T11:16:04.850597enmeeting.mahidol.ac.th sshd\[5351\]: Failed password for invalid user ubnt from 192.236.160.165 port 38266 ssh2
...
2019-10-22 12:16:56
111.68.110.21 attack
Unauthorized connection attempt from IP address 111.68.110.21 on Port 445(SMB)
2019-10-22 08:06:48
130.61.72.90 attackbots
frenzy
2019-10-22 12:02:32
210.245.26.174 attackspam
UTC: 2019-10-21 port: 123/udp
2019-10-22 12:08:47
91.132.85.128 attackspambots
X-Original-Sender: monica@coolsummer.club
2019-10-22 12:13:44
139.155.1.18 attackspam
Oct 22 06:54:00 www sshd\[47170\]: Invalid user 123456 from 139.155.1.18Oct 22 06:54:02 www sshd\[47170\]: Failed password for invalid user 123456 from 139.155.1.18 port 42108 ssh2Oct 22 06:58:23 www sshd\[47471\]: Invalid user Hamster from 139.155.1.18
...
2019-10-22 12:08:19
197.248.16.118 attackspam
Oct 22 06:53:56 server sshd\[18819\]: Invalid user tomcat from 197.248.16.118 port 34414
Oct 22 06:53:56 server sshd\[18819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.248.16.118
Oct 22 06:53:58 server sshd\[18819\]: Failed password for invalid user tomcat from 197.248.16.118 port 34414 ssh2
Oct 22 06:58:10 server sshd\[6803\]: User root from 197.248.16.118 not allowed because listed in DenyUsers
Oct 22 06:58:10 server sshd\[6803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.248.16.118  user=root
2019-10-22 12:17:23
49.235.222.199 attackspam
2019-10-22T03:58:24.963277abusebot-7.cloudsearch.cf sshd\[1255\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.222.199  user=root
2019-10-22 12:07:56
156.238.167.62 attackspambots
Oct 21 16:20:39 ACSRAD auth.info sshd[21471]: Failed password for r.r from 156.238.167.62 port 58100 ssh2
Oct 21 16:20:39 ACSRAD auth.info sshd[21471]: Received disconnect from 156.238.167.62 port 58100:11: Bye Bye [preauth]
Oct 21 16:20:39 ACSRAD auth.info sshd[21471]: Disconnected from 156.238.167.62 port 58100 [preauth]
Oct 21 16:20:40 ACSRAD auth.notice sshguard[15662]: Attack from "156.238.167.62" on service 100 whostnameh danger 10.
Oct 21 16:20:40 ACSRAD auth.notice sshguard[15662]: Attack from "156.238.167.62" on service 100 whostnameh danger 10.
Oct 21 16:26:10 ACSRAD auth.info sshd[24557]: Invalid user save from 156.238.167.62 port 42822
Oct 21 16:26:10 ACSRAD auth.info sshd[24557]: Failed password for invalid user save from 156.238.167.62 port 42822 ssh2
Oct 21 16:26:11 ACSRAD auth.info sshd[24557]: Received disconnect from 156.238.167.62 port 42822:11: Bye Bye [preauth]
Oct 21 16:26:11 ACSRAD auth.info sshd[24557]: Disconnected from 156.238.167.62 port 42822 ........
------------------------------
2019-10-22 08:10:52
117.55.197.118 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/117.55.197.118/ 
 
 NG - 1H : (1)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : NG 
 NAME ASN : ASN198504 
 
 IP : 117.55.197.118 
 
 CIDR : 117.55.197.0/24 
 
 PREFIX COUNT : 22 
 
 UNIQUE IP COUNT : 13056 
 
 
 ATTACKS DETECTED ASN198504 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-10-22 05:58:13 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-22 12:15:38
54.39.97.17 attackbotsspam
Oct 21 23:56:14 TORMINT sshd\[31224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.97.17  user=root
Oct 21 23:56:15 TORMINT sshd\[31224\]: Failed password for root from 54.39.97.17 port 60370 ssh2
Oct 22 00:00:00 TORMINT sshd\[31594\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.97.17  user=root
...
2019-10-22 12:20:24
202.230.143.53 attackbots
Oct 21 15:43:41 *** sshd[7328]: Failed password for invalid user mama from 202.230.143.53 port 46580 ssh2
2019-10-22 08:08:04
154.16.171.6 attack
WP_xmlrpc_attack
2019-10-22 08:11:09
114.92.117.248 attack
Unauthorized connection attempt from IP address 114.92.117.248 on Port 445(SMB)
2019-10-22 08:01:34

Recently Reported IPs

68.183.88.43 223.214.71.84 223.214.71.52 123.209.228.164
122.150.95.42 177.191.181.221 172.241.192.171 149.18.28.30
83.142.55.48 192.241.235.234 191.135.57.0 173.208.40.33
45.132.185.162 212.102.42.207 198.54.124.131 57.5.69.4
95.181.148.72 103.27.221.199 128.90.175.254 201.234.106.216