Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.0.71.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26370
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.0.71.72.			IN	A

;; AUTHORITY SECTION:
.			462	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110102 1800 900 604800 86400

;; Query time: 139 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 02 11:44:14 CST 2019
;; MSG SIZE  rcvd: 115
Host info
72.71.0.139.in-addr.arpa domain name pointer fm-dyn-139-0-71-72.fast.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
72.71.0.139.in-addr.arpa	name = fm-dyn-139-0-71-72.fast.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
177.72.169.236 attack
Dec 31 06:28:05 [host] sshd[19143]: Invalid user ahmed from 177.72.169.236
Dec 31 06:28:05 [host] sshd[19143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.72.169.236
Dec 31 06:28:07 [host] sshd[19143]: Failed password for invalid user ahmed from 177.72.169.236 port 28322 ssh2
2019-12-31 13:31:40
35.160.48.160 attack
12/31/2019-06:18:02.650057 35.160.48.160 Protocol: 6 SURICATA TLS invalid record/traffic
2019-12-31 13:48:24
123.115.144.14 attack
Fail2Ban - FTP Abuse Attempt
2019-12-31 13:35:15
178.128.242.233 attackspam
Dec 31 06:17:19 localhost sshd\[19810\]: Invalid user guest from 178.128.242.233 port 36476
Dec 31 06:17:19 localhost sshd\[19810\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.242.233
Dec 31 06:17:21 localhost sshd\[19810\]: Failed password for invalid user guest from 178.128.242.233 port 36476 ssh2
2019-12-31 13:28:09
222.186.175.169 attackspambots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
Failed password for root from 222.186.175.169 port 36494 ssh2
Failed password for root from 222.186.175.169 port 36494 ssh2
Failed password for root from 222.186.175.169 port 36494 ssh2
Failed password for root from 222.186.175.169 port 36494 ssh2
2019-12-31 13:29:28
115.236.168.35 attack
Dec 31 05:53:13 localhost sshd\[17340\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.236.168.35  user=root
Dec 31 05:53:16 localhost sshd\[17340\]: Failed password for root from 115.236.168.35 port 57222 ssh2
Dec 31 05:56:14 localhost sshd\[17613\]: Invalid user levans from 115.236.168.35 port 54164
2019-12-31 13:41:27
190.181.60.2 attackspambots
$f2bV_matches
2019-12-31 13:58:29
113.253.57.24 attack
1577768202 - 12/31/2019 05:56:42 Host: 113.253.57.24/113.253.57.24 Port: 445 TCP Blocked
2019-12-31 13:23:22
217.160.109.72 attack
Dec 31 06:22:48 ns3110291 sshd\[29285\]: Failed password for root from 217.160.109.72 port 43120 ssh2
Dec 31 06:25:35 ns3110291 sshd\[29353\]: Invalid user mcifuentes from 217.160.109.72
Dec 31 06:25:36 ns3110291 sshd\[29353\]: Failed password for invalid user mcifuentes from 217.160.109.72 port 57785 ssh2
Dec 31 06:28:22 ns3110291 sshd\[29391\]: Failed password for root from 217.160.109.72 port 44157 ssh2
Dec 31 06:31:05 ns3110291 sshd\[29434\]: Invalid user bady from 217.160.109.72
...
2019-12-31 13:50:19
185.100.87.206 attack
goldgier.de:80 185.100.87.206 - - [31/Dec/2019:05:56:26 +0100] "POST /xmlrpc.php HTTP/1.0" 301 497 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.81 Safari/537.36"
www.goldgier.de 185.100.87.206 [31/Dec/2019:05:56:27 +0100] "POST /xmlrpc.php HTTP/1.0" 200 3899 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.81 Safari/537.36"
2019-12-31 13:32:57
222.186.175.151 attackspambots
Dec 31 06:30:19 ns381471 sshd[28565]: Failed password for root from 222.186.175.151 port 43448 ssh2
Dec 31 06:30:23 ns381471 sshd[28565]: Failed password for root from 222.186.175.151 port 43448 ssh2
2019-12-31 13:32:29
185.57.29.87 attack
Unauthorized connection attempt detected from IP address 185.57.29.87 to port 445
2019-12-31 13:35:47
222.186.190.2 attackbotsspam
SSH Brute Force, server-1 sshd[22469]: Failed password for root from 222.186.190.2 port 44062 ssh2
2019-12-31 13:37:48
118.25.189.123 attackbotsspam
...
2019-12-31 13:51:32
51.159.64.36 attack
Dec 31 05:56:34 163-172-32-151 sshd[7313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.159.64.36  user=root
Dec 31 05:56:36 163-172-32-151 sshd[7313]: Failed password for root from 51.159.64.36 port 36315 ssh2
...
2019-12-31 13:27:20

Recently Reported IPs

66.215.182.252 176.235.76.102 183.39.189.230 99.167.43.56
174.144.22.72 42.67.118.124 178.236.39.236 231.59.115.148
61.172.136.40 66.214.181.3 47.116.22.235 254.122.125.153
163.138.237.13 112.190.21.205 224.33.73.107 20.210.248.198
59.37.162.159 127.60.20.141 216.221.152.35 153.23.159.246