Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Angola

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.172.139.210
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42568
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.172.139.210.		IN	A

;; AUTHORITY SECTION:
.			229	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:06:11 CST 2023
;; MSG SIZE  rcvd: 108
Host info
Host 210.139.172.105.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 210.139.172.105.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
27.254.153.226 attackspam
Probing for vulnerable PHP code
2020-06-11 18:31:03
52.152.173.63 attackspam
RDP brute forcing (r)
2020-06-11 17:56:46
157.25.173.76 attackbotsspam
Autoban   157.25.173.76 AUTH/CONNECT
2020-06-11 18:32:11
147.135.130.142 attack
2020-06-11T11:56:47.690811vps773228.ovh.net sshd[31977]: Failed password for invalid user postgres from 147.135.130.142 port 33806 ssh2
2020-06-11T11:57:14.556058vps773228.ovh.net sshd[31989]: Invalid user postgres from 147.135.130.142 port 42346
2020-06-11T11:57:14.568780vps773228.ovh.net sshd[31989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3078774.ip-147-135-130.eu
2020-06-11T11:57:14.556058vps773228.ovh.net sshd[31989]: Invalid user postgres from 147.135.130.142 port 42346
2020-06-11T11:57:16.467887vps773228.ovh.net sshd[31989]: Failed password for invalid user postgres from 147.135.130.142 port 42346 ssh2
...
2020-06-11 18:26:23
155.133.51.1 attack
Autoban   155.133.51.1 AUTH/CONNECT
2020-06-11 18:27:15
42.115.60.52 attackbotsspam
Port probing on unauthorized port 88
2020-06-11 18:18:04
162.243.142.200 attackspam
162.243.142.200 - - - [11/Jun/2020:07:01:57 +0200] "GET /portal/redlion HTTP/1.1" 404 162 "-" "Mozilla/5.0 zgrab/0.x" "-" "-"
2020-06-11 18:02:00
185.39.11.55 attack
SIP/5060 Probe, BF, Hack -
2020-06-11 18:25:45
103.63.215.83 attack
failed root login
2020-06-11 18:23:05
2001:ee0:4181:f826:96db:daff:fe4a:116 attackspambots
failed_logins
2020-06-11 18:21:24
58.37.214.154 attack
Fail2Ban
2020-06-11 18:31:41
106.12.91.209 attack
Jun 11 11:50:21 buvik sshd[20119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.91.209
Jun 11 11:50:23 buvik sshd[20119]: Failed password for invalid user 123456 from 106.12.91.209 port 36358 ssh2
Jun 11 11:54:06 buvik sshd[20606]: Invalid user eszrdx from 106.12.91.209
...
2020-06-11 18:05:09
109.173.40.60 attack
Invalid user hanul from 109.173.40.60 port 34988
2020-06-11 18:17:44
185.10.68.228 attackspambots
Port scan denied
2020-06-11 18:03:57
176.59.132.207 attackspambots
RDPBruteGSL24
2020-06-11 18:29:03

Recently Reported IPs

105.172.153.180 105.171.99.12 105.171.27.25 105.171.6.199
105.172.0.23 105.171.28.19 105.172.68.234 105.172.66.93
105.172.11.251 105.172.14.16 105.171.7.53 105.171.218.140
105.171.226.72 105.171.196.203 105.171.198.218 105.171.212.212
105.171.187.176 105.172.109.52 105.171.18.239 105.171.234.158