Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.125.136.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11756
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.125.136.252.		IN	A

;; AUTHORITY SECTION:
.			296	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110101 1800 900 604800 86400

;; Query time: 196 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 02 02:36:10 CST 2019
;; MSG SIZE  rcvd: 119
Host info
252.136.125.139.in-addr.arpa domain name pointer nothing.attdns.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
252.136.125.139.in-addr.arpa	name = nothing.attdns.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
190.143.125.12 attackspambots
Unauthorized connection attempt from IP address 190.143.125.12 on Port 445(SMB)
2020-09-23 09:01:04
203.124.49.64 attackbots
Sep 22 18:05:46 l02a sshd[23950]: Invalid user admin from 203.124.49.64
Sep 22 18:05:47 l02a sshd[23949]: Invalid user admin from 203.124.49.64
2020-09-23 12:06:20
106.13.225.60 attackspambots
Sep 22 20:56:21 * sshd[13054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.225.60
Sep 22 20:56:23 * sshd[13054]: Failed password for invalid user drcomadmin from 106.13.225.60 port 59488 ssh2
2020-09-23 12:05:27
128.106.164.38 attackbotsspam
Unauthorized connection attempt from IP address 128.106.164.38 on Port 445(SMB)
2020-09-23 08:37:59
61.216.131.31 attackspam
2020-09-22T23:54:09.454460abusebot-6.cloudsearch.cf sshd[7020]: Invalid user dev from 61.216.131.31 port 52270
2020-09-22T23:54:09.462678abusebot-6.cloudsearch.cf sshd[7020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61-216-131-31.hinet-ip.hinet.net
2020-09-22T23:54:09.454460abusebot-6.cloudsearch.cf sshd[7020]: Invalid user dev from 61.216.131.31 port 52270
2020-09-22T23:54:11.167546abusebot-6.cloudsearch.cf sshd[7020]: Failed password for invalid user dev from 61.216.131.31 port 52270 ssh2
2020-09-23T00:02:26.688195abusebot-6.cloudsearch.cf sshd[7217]: Invalid user admin2 from 61.216.131.31 port 47280
2020-09-23T00:02:26.695705abusebot-6.cloudsearch.cf sshd[7217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61-216-131-31.hinet-ip.hinet.net
2020-09-23T00:02:26.688195abusebot-6.cloudsearch.cf sshd[7217]: Invalid user admin2 from 61.216.131.31 port 47280
2020-09-23T00:02:28.293293abusebot-6.cloudse
...
2020-09-23 08:43:36
174.217.15.31 attackspam
Brute forcing email accounts
2020-09-23 08:45:52
34.94.247.253 attack
Automatic report - XMLRPC Attack
2020-09-23 08:48:36
195.158.20.94 attackbotsspam
Sep 23 02:17:59 piServer sshd[10066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.158.20.94 
Sep 23 02:18:02 piServer sshd[10066]: Failed password for invalid user admin from 195.158.20.94 port 48398 ssh2
Sep 23 02:22:04 piServer sshd[10481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.158.20.94 
...
2020-09-23 08:48:54
167.248.133.52 attack
167.248.133.52 - - [23/Sep/2020:00:23:42 +0200] "GET / HTTP/1.1" 200 612 "-" "-"
167.248.133.52 - - [23/Sep/2020:00:23:43 +0200] "GET / HTTP/1.1" 200 396 "-" "Mozilla/5.0 (compatible; CensysInspect/1.1; +https://about.censys.io/)"
2020-09-23 08:36:37
200.0.102.2 attackspambots
Unauthorized connection attempt from IP address 200.0.102.2 on Port 445(SMB)
2020-09-23 08:32:51
47.49.12.165 attackbots
47.49.12.165 (US/United States/047-049-012-165.biz.spectrum.com), 10 distributed imapd attacks on account [hr@fondationcrevier.ca] in the last 3600 secs
2020-09-23 08:48:06
160.153.234.236 attackspam
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-09-22T19:57:14Z and 2020-09-22T20:04:04Z
2020-09-23 08:37:19
133.106.210.217 attackbotsspam
2020-09-22T19:02:26+0200 Failed SSH Authentication/Brute Force Attack.(Server 2)
2020-09-23 08:51:53
185.191.171.19 attackbots
Unauthorized access detected from black listed ip!
2020-09-23 12:04:40
83.248.158.22 attackspam
Sep 22 21:01:47 ssh2 sshd[23106]: Invalid user osmc from 83.248.158.22 port 34326
Sep 22 21:01:47 ssh2 sshd[23106]: Failed password for invalid user osmc from 83.248.158.22 port 34326 ssh2
Sep 22 21:01:47 ssh2 sshd[23106]: Connection closed by invalid user osmc 83.248.158.22 port 34326 [preauth]
...
2020-09-23 08:55:20

Recently Reported IPs

81.133.253.48 119.142.9.147 189.14.144.190 50.78.128.32
252.221.226.99 37.156.119.92 128.164.40.71 216.66.227.71
41.102.192.133 58.169.168.130 114.34.233.25 171.195.134.120
205.157.54.162 91.204.124.5 133.244.41.101 13.191.67.43
211.100.242.33 185.60.86.141 173.123.145.182 38.160.152.130