Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.2.17.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49490
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.2.17.239.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012101 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 02:39:59 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 239.17.2.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 239.17.2.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.203.199.205 attackbotsspam
*Port Scan* detected from 159.203.199.205 (US/United States/zg-0905a-211.stretchoid.com). 4 hits in the last 206 seconds
2019-09-12 06:52:58
51.83.74.45 attackbots
Sep 11 22:10:45 MK-Soft-VM4 sshd\[15472\]: Invalid user gitolite from 51.83.74.45 port 50190
Sep 11 22:10:45 MK-Soft-VM4 sshd\[15472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.74.45
Sep 11 22:10:46 MK-Soft-VM4 sshd\[15472\]: Failed password for invalid user gitolite from 51.83.74.45 port 50190 ssh2
...
2019-09-12 06:39:15
106.111.94.207 attackspam
$f2bV_matches
2019-09-12 06:20:49
188.168.142.68 attackbots
[ER hit] Tried to deliver spam. Already well known.
2019-09-12 06:41:20
145.239.89.243 attackspam
Sep 12 00:20:38 tux-35-217 sshd\[20419\]: Invalid user jenkins from 145.239.89.243 port 33862
Sep 12 00:20:38 tux-35-217 sshd\[20419\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.89.243
Sep 12 00:20:40 tux-35-217 sshd\[20419\]: Failed password for invalid user jenkins from 145.239.89.243 port 33862 ssh2
Sep 12 00:26:10 tux-35-217 sshd\[20444\]: Invalid user ubuntu from 145.239.89.243 port 42580
Sep 12 00:26:10 tux-35-217 sshd\[20444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.89.243
...
2019-09-12 06:44:10
49.88.112.55 attack
tried it too often
2019-09-12 06:20:15
114.242.169.37 attackbots
Sep 11 18:23:26 plusreed sshd[28280]: Invalid user 123456 from 114.242.169.37
...
2019-09-12 06:31:20
162.158.183.123 attackbots
SQL injection:/mobile/index.php/index.php?language=ru&menu_selected=67;%00&sub_menu_selected=343&
2019-09-12 06:43:49
114.111.53.104 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-11 18:34:35,270 INFO [amun_request_handler] PortScan Detected on Port: 445 (114.111.53.104)
2019-09-12 06:36:22
183.88.38.93 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-11 18:36:39,946 INFO [amun_request_handler] PortScan Detected on Port: 445 (183.88.38.93)
2019-09-12 06:24:53
146.66.244.246 attackspam
SSH Bruteforce
2019-09-12 06:47:47
217.21.193.20 attackbots
5800/tcp 5601/tcp 5444/tcp...
[2019-07-11/09-11]2057pkt,102pt.(tcp),2tp.(icmp)
2019-09-12 06:49:43
106.12.11.160 attack
Sep 11 12:14:40 sachi sshd\[6151\]: Invalid user user from 106.12.11.160
Sep 11 12:14:40 sachi sshd\[6151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.11.160
Sep 11 12:14:42 sachi sshd\[6151\]: Failed password for invalid user user from 106.12.11.160 port 40408 ssh2
Sep 11 12:21:38 sachi sshd\[6773\]: Invalid user test from 106.12.11.160
Sep 11 12:21:38 sachi sshd\[6773\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.11.160
2019-09-12 06:32:41
107.150.89.253 attackbotsspam
25,48-04/04 [bc03/m123] concatform PostRequest-Spammer scoring: berlin
2019-09-12 06:42:51
220.134.81.126 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-09-12 06:31:53

Recently Reported IPs

186.58.154.201 241.193.50.253 109.69.171.146 47.240.188.35
174.80.245.3 81.141.103.135 147.49.184.115 53.129.110.15
220.158.181.173 232.204.184.226 147.15.94.156 129.136.30.37
244.229.124.166 239.204.149.63 88.171.32.209 186.114.157.225
39.54.136.6 100.247.48.94 144.153.94.229 28.90.189.89