Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.19.217.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43457
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.19.217.8.			IN	A

;; AUTHORITY SECTION:
.			154	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 05:37:27 CST 2022
;; MSG SIZE  rcvd: 105
Host info
8.217.19.139.in-addr.arpa domain name pointer cityscapes-dataset.com.
8.217.19.139.in-addr.arpa domain name pointer www.cityscapes-dataset.net.
8.217.19.139.in-addr.arpa domain name pointer www.cityscapes-dataset.com.
8.217.19.139.in-addr.arpa domain name pointer cityscapes-dataset.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
8.217.19.139.in-addr.arpa	name = www.cityscapes-dataset.net.
8.217.19.139.in-addr.arpa	name = www.cityscapes-dataset.com.
8.217.19.139.in-addr.arpa	name = cityscapes-dataset.net.
8.217.19.139.in-addr.arpa	name = cityscapes-dataset.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
177.36.58.182 attackspambots
SSH Brute Force
2019-09-27 04:41:33
116.90.230.186 attackspambots
Unauthorized connection attempt from IP address 116.90.230.186 on Port 445(SMB)
2019-09-27 04:47:09
51.89.164.224 attackbots
Sep 26 22:17:43 lnxweb62 sshd[27805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.164.224
2019-09-27 04:28:35
123.189.157.176 attackspambots
Unauthorised access (Sep 26) SRC=123.189.157.176 LEN=40 TTL=49 ID=25296 TCP DPT=8080 WINDOW=4942 SYN
2019-09-27 04:51:11
31.132.69.221 attackspambots
Honeypot attack, port: 23, PTR: 31-132-69-221.neanet.pl.
2019-09-27 04:21:37
105.112.105.131 attackspambots
Unauthorized connection attempt from IP address 105.112.105.131 on Port 445(SMB)
2019-09-27 04:39:26
186.211.186.118 attack
Honeypot attack, port: 445, PTR: 186-211-186-118.commcorp.net.br.
2019-09-27 04:18:40
104.183.23.173 attackspambots
Honeypot attack, port: 23, PTR: 104-183-23-173.lightspeed.rcsntx.sbcglobal.net.
2019-09-27 04:33:51
222.186.175.154 attack
Sep 23 13:53:37 microserver sshd[32433]: Failed password for root from 222.186.175.154 port 7660 ssh2
Sep 23 13:53:37 microserver sshd[32433]: error: maximum authentication attempts exceeded for root from 222.186.175.154 port 7660 ssh2 [preauth]
Sep 23 13:53:45 microserver sshd[32465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154  user=root
Sep 23 13:53:48 microserver sshd[32465]: Failed password for root from 222.186.175.154 port 12904 ssh2
Sep 23 13:53:51 microserver sshd[32465]: Failed password for root from 222.186.175.154 port 12904 ssh2
Sep 23 13:53:55 microserver sshd[32465]: Failed password for root from 222.186.175.154 port 12904 ssh2
Sep 23 13:54:00 microserver sshd[32465]: Failed password for root from 222.186.175.154 port 12904 ssh2
Sep 23 13:54:04 microserver sshd[32465]: Failed password for root from 222.186.175.154 port 12904 ssh2
Sep 23 13:54:08 microserver sshd[32465]: Failed password for root from 222.186.175.154 port 12904 ssh2
Sep
2019-09-27 04:40:07
112.85.42.180 attackspam
2019-09-26T20:05:13.596182abusebot-6.cloudsearch.cf sshd\[19556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.180  user=root
2019-09-27 04:23:02
49.148.197.250 attack
Unauthorized connection attempt from IP address 49.148.197.250 on Port 445(SMB)
2019-09-27 04:49:40
113.62.176.97 attackspam
SSH Brute Force
2019-09-27 04:42:22
185.43.8.43 attackbotsspam
proto=tcp  .  spt=46297  .  dpt=25  .     (Listed on    MailSpike (spam wave plus L3-L5) also unsubscore and rbldns-ru)     (367)
2019-09-27 04:33:00
61.191.50.173 attack
Unauthorized connection attempt from IP address 61.191.50.173 on Port 445(SMB)
2019-09-27 04:15:04
150.129.121.17 attackspam
Unauthorized connection attempt from IP address 150.129.121.17 on Port 445(SMB)
2019-09-27 04:24:47

Recently Reported IPs

139.189.248.126 139.190.147.21 139.190.136.74 139.196.144.236
139.196.234.69 233.93.83.12 139.162.152.88 139.162.163.241
139.162.158.92 139.162.184.73 139.162.17.32 139.162.161.88
139.162.197.128 139.162.199.123 139.162.219.192 139.162.22.174
139.155.41.218 139.162.102.199 139.162.103.172 46.44.114.168