Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.19.154.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52479
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.19.154.70.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400

;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 14:53:28 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 70.154.19.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 70.154.19.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
180.168.223.66 attackspam
Brute force SMTP login attempted.
...
2019-08-10 07:10:37
132.232.74.106 attack
Brute force SMTP login attempted.
...
2019-08-10 07:26:02
185.220.100.252 attackspambots
Automatic report - Banned IP Access
2019-08-10 07:21:24
61.19.22.217 attack
Fail2Ban Ban Triggered
2019-08-10 07:18:52
132.232.248.82 attack
Brute force SMTP login attempted.
...
2019-08-10 07:35:17
192.160.102.170 attack
Aug  9 23:06:14 marvibiene sshd[26955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.160.102.170  user=root
Aug  9 23:06:16 marvibiene sshd[26955]: Failed password for root from 192.160.102.170 port 46627 ssh2
Aug  9 23:06:19 marvibiene sshd[26955]: Failed password for root from 192.160.102.170 port 46627 ssh2
Aug  9 23:06:14 marvibiene sshd[26955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.160.102.170  user=root
Aug  9 23:06:16 marvibiene sshd[26955]: Failed password for root from 192.160.102.170 port 46627 ssh2
Aug  9 23:06:19 marvibiene sshd[26955]: Failed password for root from 192.160.102.170 port 46627 ssh2
...
2019-08-10 07:53:44
138.97.246.65 attackspambots
libpam_shield report: forced login attempt
2019-08-10 07:07:46
27.50.138.132 attackbots
Automatic report
2019-08-10 07:39:52
137.74.172.17 attackbotsspam
RDP Bruteforce
2019-08-10 07:34:03
180.126.238.118 attack
SSHAttack
2019-08-10 07:12:09
51.91.248.56 attackspambots
Aug 10 04:46:26 webhost01 sshd[9418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.248.56
Aug 10 04:46:29 webhost01 sshd[9418]: Failed password for invalid user alcione from 51.91.248.56 port 40958 ssh2
...
2019-08-10 07:21:50
121.171.117.248 attackspam
detected by Fail2Ban
2019-08-10 07:33:03
132.232.108.143 attackbots
Brute force SMTP login attempted.
...
2019-08-10 07:53:14
209.97.161.96 attackbotsspam
WordPress login Brute force / Web App Attack on client site.
2019-08-10 07:46:01
104.236.75.186 attackbots
Automatic report - Banned IP Access
2019-08-10 07:42:25

Recently Reported IPs

151.244.184.92 80.32.44.120 89.46.108.214 128.227.241.63
176.184.47.45 145.84.36.236 254.101.11.108 136.70.178.31
114.31.181.253 61.31.3.167 104.104.204.185 16.147.157.94
196.39.164.235 59.71.44.175 36.164.17.244 22.80.59.32
112.150.15.52 247.238.77.184 140.15.230.40 180.115.167.136