Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Lochen

Region: Upper Austria

Country: Austria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.178.125.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36373
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.178.125.241.		IN	A

;; AUTHORITY SECTION:
.			356	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:11:33 CST 2022
;; MSG SIZE  rcvd: 108
Host info
241.125.178.139.in-addr.arpa domain name pointer 139.178.125.241.power-speed.at.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
241.125.178.139.in-addr.arpa	name = 139.178.125.241.power-speed.at.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.51.160.47 attack
Unauthorized connection attempt detected from IP address 49.51.160.47 to port 1433
2020-06-22 06:37:44
150.109.230.162 attack
Unauthorized connection attempt detected from IP address 150.109.230.162 to port 80
2020-06-22 06:30:01
62.110.108.249 attackspambots
Unauthorized connection attempt detected from IP address 62.110.108.249 to port 23
2020-06-22 06:18:24
49.51.161.114 attack
Unauthorized connection attempt detected from IP address 49.51.161.114 to port 497
2020-06-22 06:37:28
49.65.152.96 attack
Unauthorized connection attempt detected from IP address 49.65.152.96 to port 8118
2020-06-22 06:18:43
49.51.8.195 attack
Unauthorized connection attempt detected from IP address 49.51.8.195 to port 1443
2020-06-22 06:38:11
187.132.198.198 attack
Unauthorized connection attempt detected from IP address 187.132.198.198 to port 88
2020-06-22 06:10:19
222.186.190.2 attackspambots
Jun 21 23:57:50 santamaria sshd\[21189\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
Jun 21 23:57:52 santamaria sshd\[21189\]: Failed password for root from 222.186.190.2 port 22792 ssh2
Jun 21 23:58:03 santamaria sshd\[21189\]: Failed password for root from 222.186.190.2 port 22792 ssh2
...
2020-06-22 06:23:20
31.211.144.10 attackspambots
Unauthorized connection attempt detected from IP address 31.211.144.10 to port 23
2020-06-22 06:39:22
5.202.158.178 attack
Unauthorized connection attempt detected from IP address 5.202.158.178 to port 80
2020-06-22 06:05:47
119.28.234.30 attackbotsspam
Unauthorized connection attempt detected from IP address 119.28.234.30 to port 1000
2020-06-22 06:30:48
221.122.68.26 attackspambots
Unauthorized connection attempt detected from IP address 221.122.68.26 to port 1433
2020-06-22 06:39:59
47.110.147.84 attackbotsspam
Unauthorized connection attempt detected from IP address 47.110.147.84 to port 8080
2020-06-22 06:19:03
193.169.252.216 attackspam
Unauthorized connection attempt detected from IP address 193.169.252.216 to port 3389
2020-06-22 06:42:06
122.235.188.128 attackspambots
Unauthorized connection attempt detected from IP address 122.235.188.128 to port 8118
2020-06-22 06:12:56

Recently Reported IPs

139.177.207.12 139.178.109.144 139.178.127.128 139.177.207.241
139.178.81.19 139.178.24.174 139.178.89.79 139.178.86.114
139.180.128.12 139.18.16.156 139.178.88.225 139.180.128.130
118.232.61.28 139.180.128.214 139.180.128.180 139.180.128.140
139.180.128.210 139.180.128.30 139.180.128.249 139.180.128.60