Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.21.252.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12663
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.21.252.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 05:05:56 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 139.252.21.117.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.252.21.117.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
142.54.101.146 attackspam
Jul 29 20:25:08 sshgateway sshd\[8116\]: Invalid user git from 142.54.101.146
Jul 29 20:25:08 sshgateway sshd\[8116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.54.101.146
Jul 29 20:25:10 sshgateway sshd\[8116\]: Failed password for invalid user git from 142.54.101.146 port 49396 ssh2
2019-07-30 07:23:40
192.241.159.27 attackspam
2019-07-29T16:11:09.391644mizuno.rwx.ovh sshd[18740]: Connection from 192.241.159.27 port 44376 on 78.46.61.178 port 22
2019-07-29T16:11:15.220379mizuno.rwx.ovh sshd[18740]: Invalid user php5 from 192.241.159.27 port 44376
2019-07-29T16:11:15.228453mizuno.rwx.ovh sshd[18740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.159.27
2019-07-29T16:11:09.391644mizuno.rwx.ovh sshd[18740]: Connection from 192.241.159.27 port 44376 on 78.46.61.178 port 22
2019-07-29T16:11:15.220379mizuno.rwx.ovh sshd[18740]: Invalid user php5 from 192.241.159.27 port 44376
2019-07-29T16:11:17.093586mizuno.rwx.ovh sshd[18740]: Failed password for invalid user php5 from 192.241.159.27 port 44376 ssh2
...
2019-07-30 07:24:13
3.213.119.219 attackbotsspam
Jul 29 23:15:33 h2177944 sshd\[14475\]: Invalid user newaccount from 3.213.119.219 port 38668
Jul 29 23:15:33 h2177944 sshd\[14475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.213.119.219
Jul 29 23:15:36 h2177944 sshd\[14475\]: Failed password for invalid user newaccount from 3.213.119.219 port 38668 ssh2
Jul 29 23:47:19 h2177944 sshd\[15625\]: Invalid user none1 from 3.213.119.219 port 35626
Jul 29 23:47:19 h2177944 sshd\[15625\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.213.119.219
...
2019-07-30 06:50:57
175.180.131.232 attackbotsspam
Jul 29 17:34:33 TORMINT sshd\[18744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.180.131.232  user=root
Jul 29 17:34:35 TORMINT sshd\[18744\]: Failed password for root from 175.180.131.232 port 49232 ssh2
Jul 29 17:39:35 TORMINT sshd\[18890\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.180.131.232  user=root
...
2019-07-30 07:11:31
112.85.42.194 attackbotsspam
Jul 30 01:13:38 legacy sshd[16392]: Failed password for root from 112.85.42.194 port 56574 ssh2
Jul 30 01:14:21 legacy sshd[16404]: Failed password for root from 112.85.42.194 port 10584 ssh2
...
2019-07-30 07:16:04
112.94.2.65 attackspambots
Jul 30 01:44:00 srv-4 sshd\[20419\]: Invalid user catchall from 112.94.2.65
Jul 30 01:44:00 srv-4 sshd\[20419\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.94.2.65
Jul 30 01:44:02 srv-4 sshd\[20419\]: Failed password for invalid user catchall from 112.94.2.65 port 10209 ssh2
...
2019-07-30 06:49:54
178.62.84.12 attackbots
Jul 30 03:51:11 vibhu-HP-Z238-Microtower-Workstation sshd\[31727\]: Invalid user wl from 178.62.84.12
Jul 30 03:51:11 vibhu-HP-Z238-Microtower-Workstation sshd\[31727\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.84.12
Jul 30 03:51:13 vibhu-HP-Z238-Microtower-Workstation sshd\[31727\]: Failed password for invalid user wl from 178.62.84.12 port 36004 ssh2
Jul 30 03:57:22 vibhu-HP-Z238-Microtower-Workstation sshd\[31881\]: Invalid user kj from 178.62.84.12
Jul 30 03:57:22 vibhu-HP-Z238-Microtower-Workstation sshd\[31881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.84.12
...
2019-07-30 06:44:32
2602:ff3c:0:1:216:3eff:fee3:f8db attackbotsspam
[munged]::80 2602:ff3c:0:1:216:3eff:fee3:f8db - - [29/Jul/2019:19:36:04 +0200] "POST /[munged]: HTTP/1.1" 503 3020 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::80 2602:ff3c:0:1:216:3eff:fee3:f8db - - [29/Jul/2019:19:36:06 +0200] "POST /[munged]: HTTP/1.1" 503 2881 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::80 2602:ff3c:0:1:216:3eff:fee3:f8db - - [29/Jul/2019:19:36:08 +0200] "POST /[munged]: HTTP/1.1" 503 2881 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::80 2602:ff3c:0:1:216:3eff:fee3:f8db - - [29/Jul/2019:19:36:09 +0200] "POST /[munged]: HTTP/1.1" 503 2881 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::80 2602:ff3c:0:1:216:3eff:fee3:f8db - - [29/Jul/2019:19:36:10 +0200] "POST /[munged]: HTTP/1.1" 503 2881 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::80 2602:ff3c:0:1:216:3ef
2019-07-30 06:54:46
45.116.106.237 attack
IP: 45.116.106.237
ASN: AS133647 ELXIRE DATA SERVICES PVT. LTD.
Port: Simple Mail Transfer 25
Found in one or more Blacklists
Date: 29/07/2019 5:35:31 PM UTC
2019-07-30 07:17:58
77.87.98.174 attackspambots
IP: 77.87.98.174
ASN: AS43182 ITT Ltd.
Port: Simple Mail Transfer 25
Found in one or more Blacklists
Date: 29/07/2019 5:35:53 PM UTC
2019-07-30 07:06:42
1.180.64.86 attack
Brute force attack stopped by firewall
2019-07-30 07:25:33
60.250.67.47 attack
Jul 29 22:05:21 MK-Soft-VM7 sshd\[15535\]: Invalid user git321 from 60.250.67.47 port 46504
Jul 29 22:05:21 MK-Soft-VM7 sshd\[15535\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.250.67.47
Jul 29 22:05:23 MK-Soft-VM7 sshd\[15535\]: Failed password for invalid user git321 from 60.250.67.47 port 46504 ssh2
...
2019-07-30 07:27:20
140.143.151.93 attack
Jul 30 00:45:08 ubuntu-2gb-nbg1-dc3-1 sshd[20568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.151.93
Jul 30 00:45:09 ubuntu-2gb-nbg1-dc3-1 sshd[20568]: Failed password for invalid user 123456 from 140.143.151.93 port 36420 ssh2
...
2019-07-30 07:02:08
104.206.128.18 attackbotsspam
Automatic report - Port Scan Attack
2019-07-30 06:57:33
185.53.88.22 attackspam
\[2019-07-29 18:36:39\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-29T18:36:39.841-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9441519470495",SessionID="0x7ff4d0411568",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.22/60128",ACLName="no_extension_match"
\[2019-07-29 18:38:19\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-29T18:38:19.618-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441519470495",SessionID="0x7ff4d0592ee8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.22/59974",ACLName="no_extension_match"
\[2019-07-29 18:39:54\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-29T18:39:54.274-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011441519470495",SessionID="0x7ff4d0411568",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.22/64393",ACLName="no_extensi
2019-07-30 06:55:02

Recently Reported IPs

41.36.92.2 99.156.239.241 94.27.121.177 18.50.232.218
43.196.42.28 244.61.122.243 121.0.228.134 124.79.211.234
85.52.4.191 173.121.0.9 224.147.34.212 42.42.243.153
62.102.13.115 23.255.130.246 218.1.192.225 192.99.19.105
162.175.4.208 167.85.17.54 211.118.88.111 4.26.7.191