Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.2.205.237
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 887
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.2.205.237.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 06:21:54 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 237.205.2.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 237.205.2.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
77.247.110.69 attackspambots
77.247.110.69 was recorded 11 times by 8 hosts attempting to connect to the following ports: 65411,65415,65413,65412,65414. Incident counter (4h, 24h, all-time): 11, 50, 67
2020-01-23 21:04:13
34.248.160.160 attackbotsspam
portscan was detected
2020-01-23 21:14:49
142.93.251.1 attackspambots
Invalid user ftpuser from 142.93.251.1 port 52962
2020-01-23 21:22:29
178.32.221.142 attack
Invalid user admin from 178.32.221.142 port 44801
2020-01-23 21:18:11
106.12.156.236 attackspam
Invalid user kamil from 106.12.156.236 port 40490
2020-01-23 21:10:05
124.158.164.146 attackspambots
"SSH brute force auth login attempt."
2020-01-23 20:56:53
185.151.242.91 attackbotsspam
Honeypot hit.
2020-01-23 21:12:30
54.38.160.4 attack
Jan 23 13:09:25 SilenceServices sshd[10799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.160.4
Jan 23 13:09:27 SilenceServices sshd[10799]: Failed password for invalid user anton from 54.38.160.4 port 37630 ssh2
Jan 23 13:12:51 SilenceServices sshd[13460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.160.4
2020-01-23 21:17:41
51.38.232.93 attackbots
"SSH brute force auth login attempt."
2020-01-23 21:21:51
220.120.106.254 attackbots
Unauthorized connection attempt detected from IP address 220.120.106.254 to port 2220 [J]
2020-01-23 20:54:32
190.47.71.41 attack
Invalid user kwinfo from 190.47.71.41 port 37176
2020-01-23 21:05:49
202.62.70.76 attackbots
"SMTP brute force auth login attempt."
2020-01-23 21:11:14
178.122.156.70 attackspam
"SMTP brute force auth login attempt."
2020-01-23 21:15:37
187.39.201.19 attackbots
Unauthorized connection attempt detected from IP address 187.39.201.19 to port 2220 [J]
2020-01-23 20:56:28
128.199.202.206 attackbots
"SSH brute force auth login attempt."
2020-01-23 21:24:57

Recently Reported IPs

27.54.146.84 225.45.250.163 131.14.0.165 37.161.244.107
237.171.120.118 252.236.18.150 148.63.134.124 158.117.187.215
116.103.120.184 172.253.240.190 97.233.3.97 59.161.202.251
185.162.195.229 138.96.131.52 191.166.141.140 240.60.78.103
238.57.214.156 93.110.224.135 162.163.72.206 95.6.12.160