Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.69.72.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37071
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.69.72.239.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 05:23:52 CST 2025
;; MSG SIZE  rcvd: 106
Host info
239.72.69.134.in-addr.arpa domain name pointer n72h239.dhcp.oxy.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
239.72.69.134.in-addr.arpa	name = n72h239.dhcp.oxy.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
77.247.108.146 attackspam
firewall-block, port(s): 5060/udp
2019-07-02 09:19:18
159.89.182.194 attack
Jul  2 01:27:58 giegler sshd[24715]: Invalid user emil from 159.89.182.194 port 46756
2019-07-02 09:32:05
128.199.177.224 attackspam
Automatic report
2019-07-02 09:26:57
185.156.177.148 attackbotsspam
Port Scan 3389
2019-07-02 08:54:47
185.162.235.157 attackbotsspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-02 09:19:51
187.87.6.175 attack
Jul  1 19:06:51 web1 postfix/smtpd[18310]: warning: unknown[187.87.6.175]: SASL PLAIN authentication failed: authentication failure
...
2019-07-02 09:15:57
151.80.162.216 attackspam
Jul  2 03:13:41 mail postfix/smtpd\[21412\]: warning: unknown\[151.80.162.216\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  2 03:15:18 mail postfix/smtpd\[18928\]: warning: unknown\[151.80.162.216\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  2 03:17:13 mail postfix/smtpd\[21416\]: warning: unknown\[151.80.162.216\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-07-02 09:26:31
111.53.195.15 attackbotsspam
Port Scan 3389
2019-07-02 09:12:38
139.59.70.180 attackbotsspam
SSH-BruteForce
2019-07-02 08:51:28
41.227.179.167 attack
Trying to deliver email spam, but blocked by RBL
2019-07-02 08:53:04
156.199.138.58 attack
port scan and connect, tcp 22 (ssh)
2019-07-02 09:32:38
197.44.94.194 attack
Trying to deliver email spam, but blocked by RBL
2019-07-02 08:58:13
120.131.0.201 attackspambots
SSH Brute-Forcing (ownc)
2019-07-02 08:51:04
156.219.174.165 attackbotsspam
Honeypot attack, port: 23, PTR: host-156.219.165.174-static.tedata.net.
2019-07-02 09:35:08
45.55.12.248 attackspambots
Jul  2 00:31:01 marvibiene sshd[9162]: Invalid user bonaparte from 45.55.12.248 port 54068
Jul  2 00:31:01 marvibiene sshd[9162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.12.248
Jul  2 00:31:01 marvibiene sshd[9162]: Invalid user bonaparte from 45.55.12.248 port 54068
Jul  2 00:31:03 marvibiene sshd[9162]: Failed password for invalid user bonaparte from 45.55.12.248 port 54068 ssh2
...
2019-07-02 09:15:25

Recently Reported IPs

86.74.249.90 118.140.185.37 185.149.48.157 31.251.43.14
157.28.101.188 42.221.185.235 222.99.148.219 251.63.55.144
8.43.116.235 244.162.118.196 228.67.91.163 74.218.140.17
168.205.26.233 21.37.98.106 238.188.108.170 213.78.232.188
162.244.64.6 255.199.251.56 118.197.201.41 219.190.187.74