Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Topeka

Region: Kansas

Country: United States

Internet Service Provider: PACE

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.239.218.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34404
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.239.218.139.		IN	A

;; AUTHORITY SECTION:
.			154	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031901 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 20 12:22:20 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 139.218.239.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.218.239.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
189.152.228.118 attack
Unauthorized connection attempt detected from IP address 189.152.228.118 to port 445
2019-12-23 03:32:08
2.184.57.129 attackbotsspam
Unauthorized IMAP connection attempt
2019-12-23 03:29:50
35.160.48.160 attack
12/22/2019-20:14:08.288236 35.160.48.160 Protocol: 6 SURICATA TLS invalid record/traffic
2019-12-23 03:23:16
2.87.177.241 attack
Unauthorized IMAP connection attempt
2019-12-23 03:30:11
35.225.122.90 attackspam
Dec 22 19:13:58 zeus sshd[24688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.225.122.90 
Dec 22 19:13:59 zeus sshd[24688]: Failed password for invalid user server from 35.225.122.90 port 52206 ssh2
Dec 22 19:18:41 zeus sshd[24824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.225.122.90 
Dec 22 19:18:43 zeus sshd[24824]: Failed password for invalid user baerbel from 35.225.122.90 port 58254 ssh2
2019-12-23 03:26:45
103.106.137.39 attackspambots
Brute force SMTP login attempts.
2019-12-23 03:03:29
156.223.129.221 attackbotsspam
DLink DSL Remote OS Command Injection Vulnerability, PTR: host-156.223.221.129-static.tedata.net.
2019-12-23 03:39:49
178.128.169.88 attack
php WP PHPmyadamin ABUSE blocked for 12h
2019-12-23 03:36:27
23.129.64.155 attack
Attempting to exploit vulnerabilities of common CMS site
2019-12-23 03:09:38
200.69.250.253 attackspambots
Dec 22 17:08:26 xeon sshd[42069]: Failed password for root from 200.69.250.253 port 57902 ssh2
2019-12-23 03:16:25
133.130.90.174 attackspambots
Dec 22 14:41:53 localhost sshd\[28146\]: Invalid user admin from 133.130.90.174 port 57662
Dec 22 14:41:53 localhost sshd\[28146\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.90.174
Dec 22 14:41:55 localhost sshd\[28146\]: Failed password for invalid user admin from 133.130.90.174 port 57662 ssh2
Dec 22 14:48:00 localhost sshd\[28397\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.90.174  user=root
Dec 22 14:48:02 localhost sshd\[28397\]: Failed password for root from 133.130.90.174 port 33298 ssh2
...
2019-12-23 03:36:54
189.79.100.98 attack
2019-12-22T18:59:47.736012shield sshd\[14579\]: Invalid user fdcuma from 189.79.100.98 port 52000
2019-12-22T18:59:47.741431shield sshd\[14579\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.79.100.98
2019-12-22T18:59:49.575966shield sshd\[14579\]: Failed password for invalid user fdcuma from 189.79.100.98 port 52000 ssh2
2019-12-22T19:06:50.141050shield sshd\[17139\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.79.100.98  user=root
2019-12-22T19:06:52.381892shield sshd\[17139\]: Failed password for root from 189.79.100.98 port 57880 ssh2
2019-12-23 03:27:43
23.129.64.153 attackbotsspam
Spambot
2019-12-23 03:36:06
191.232.163.135 attackspambots
Dec 22 09:01:16 auw2 sshd\[22209\]: Invalid user higang from 191.232.163.135
Dec 22 09:01:16 auw2 sshd\[22209\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.232.163.135
Dec 22 09:01:18 auw2 sshd\[22209\]: Failed password for invalid user higang from 191.232.163.135 port 39076 ssh2
Dec 22 09:07:50 auw2 sshd\[22828\]: Invalid user lxd from 191.232.163.135
Dec 22 09:07:50 auw2 sshd\[22828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.232.163.135
2019-12-23 03:12:25
179.209.45.233 attack
Botnet spam UTC Dec 22 13:59:27 from= proto=ESMTP helo=
2019-12-23 03:07:27

Recently Reported IPs

104.239.197.81 104.239.224.187 104.239.226.124 104.239.227.212
104.239.227.65 104.239.228.183 104.239.231.12 104.239.237.217
104.239.240.184 104.239.240.31 104.239.240.46 104.239.249.241
104.24.1.211 242.209.175.104 104.24.10.40 104.24.10.9
104.24.102.170 104.24.11.40 104.24.11.9 104.24.12.174