Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.189.204.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32304
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;12.189.204.39.			IN	A

;; AUTHORITY SECTION:
.			137	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020090500 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 06 05:14:04 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 39.204.189.12.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 39.204.189.12.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
141.98.80.32 attackspambots
Exim brute force attack (multiple auth failures).
2020-04-29 20:44:05
185.50.149.11 attack
Exim brute force attack (multiple auth failures).
2020-04-29 20:43:10
207.237.148.214 attack
Apr 29 13:49:11 mail.srvfarm.net postfix/smtpd[148816]: NOQUEUE: reject: RCPT from unknown[207.237.148.214]: 554 5.7.1 Service unavailable; Client host [207.237.148.214] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?207.237.148.214; from= to= proto=ESMTP helo=<2ic-dz.com>
Apr 29 13:49:17 mail.srvfarm.net postfix/smtpd[148816]: NOQUEUE: reject: RCPT from unknown[207.237.148.214]: 554 5.7.1 Service unavailable; Client host [207.237.148.214] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?207.237.148.214; from= to= proto=ESMTP helo=<2ic-dz.com>
Apr 29 13:49:19 mail.srvfarm.net postfix/smtpd[148816]: NOQUEUE: reject: RCPT from unknown[207.237.148.214]: 554 5.7.1 Service unavailable; Client host [207.237.148.214] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?207.237.148.214; from= to=
2020-04-29 20:35:54
222.186.42.136 attackspambots
Failed password for root from 222.186.42.136 port 45932 ssh2
2020-04-29 20:13:03
185.143.74.73 attack
Apr 28 16:07:10 nirvana postfix/smtpd[21664]: connect from unknown[185.143.74.73]
Apr 28 16:07:15 nirvana postfix/smtpd[21664]: warning: unknown[185.143.74.73]: SASL LOGIN authentication failed: authentication failure
Apr 28 16:07:16 nirvana postfix/smtpd[21664]: disconnect from unknown[185.143.74.73]
Apr 28 16:07:24 nirvana postfix/smtpd[21664]: connect from unknown[185.143.74.73]
Apr 28 16:07:29 nirvana postfix/smtpd[21664]: warning: unknown[185.143.74.73]: SASL LOGIN authentication failed: authentication failure
Apr 28 16:07:30 nirvana postfix/smtpd[21664]: disconnect from unknown[185.143.74.73]
Apr 28 16:07:30 nirvana postfix/smtpd[21664]: connect from unknown[185.143.74.73]
Apr 28 16:07:30 nirvana postfix/smtpd[21994]: connect from unknown[185.143.74.73]
Apr 28 16:07:35 nirvana postfix/smtpd[21664]: warning: unknown[185.143.74.73]: SASL LOGIN authentication failed: authentication failure
Apr 28 16:07:35 nirvana postfix/smtpd[21994]: warning: unknown[185.143.74.73]:........
-------------------------------
2020-04-29 20:41:11
192.241.175.48 attackspam
Invalid user gnuworld from 192.241.175.48 port 59732
2020-04-29 20:19:17
37.187.7.95 attackspam
Apr 29 04:52:03 pixelmemory sshd[2868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.7.95
Apr 29 04:52:05 pixelmemory sshd[2868]: Failed password for invalid user info from 37.187.7.95 port 34655 ssh2
Apr 29 05:03:57 pixelmemory sshd[5445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.7.95
...
2020-04-29 20:32:24
193.254.245.178 attack
193.254.245.178 was recorded 6 times by 5 hosts attempting to connect to the following ports: 5060. Incident counter (4h, 24h, all-time): 6, 22, 1198
2020-04-29 20:28:30
123.206.22.59 attackspam
Apr 29 14:04:03 vmd48417 sshd[14499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.22.59
2020-04-29 20:27:19
185.176.27.34 attack
scans 12 times in preceeding hours on the ports (in chronological order) 32694 32788 32788 32786 32897 32991 32989 32990 33085 33084 33083 33099 resulting in total of 78 scans from 185.176.27.0/24 block.
2020-04-29 20:24:13
218.63.72.113 attack
Apr 29 13:51:41 debian-2gb-nbg1-2 kernel: \[10420023.737118\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=218.63.72.113 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=48 ID=15079 PROTO=TCP SPT=35408 DPT=23 WINDOW=38976 RES=0x00 SYN URGP=0
2020-04-29 20:07:15
120.28.122.103 attackspam
Apr 29 09:04:15 ws22vmsma01 sshd[202666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.28.122.103
Apr 29 09:04:16 ws22vmsma01 sshd[202666]: Failed password for invalid user admin from 120.28.122.103 port 44207 ssh2
...
2020-04-29 20:10:02
185.143.74.108 attackspam
Apr 29 14:31:10 relay postfix/smtpd\[14987\]: warning: unknown\[185.143.74.108\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 29 14:32:03 relay postfix/smtpd\[9286\]: warning: unknown\[185.143.74.108\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 29 14:32:16 relay postfix/smtpd\[14991\]: warning: unknown\[185.143.74.108\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 29 14:33:06 relay postfix/smtpd\[9300\]: warning: unknown\[185.143.74.108\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 29 14:33:22 relay postfix/smtpd\[14987\]: warning: unknown\[185.143.74.108\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-04-29 20:40:49
222.186.175.183 attackbots
Apr 29 14:18:11 vpn01 sshd[29071]: Failed password for root from 222.186.175.183 port 8244 ssh2
Apr 29 14:18:15 vpn01 sshd[29071]: Failed password for root from 222.186.175.183 port 8244 ssh2
...
2020-04-29 20:22:00
106.53.28.5 attack
Apr 29 12:03:55 *** sshd[31749]: User root from 106.53.28.5 not allowed because not listed in AllowUsers
2020-04-29 20:33:53

Recently Reported IPs

207.244.252.113 235.148.66.142 78.231.187.19 95.223.83.247
35.187.132.123 193.25.121.249 81.163.14.205 45.185.133.72
162.158.159.140 85.165.38.54 86.60.38.57 200.233.231.104
98.159.99.58 152.200.32.198 209.97.130.11 183.166.148.235
164.163.25.207 113.184.255.20 165.232.112.170 45.140.17.61