Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.217.81.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36101
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.217.81.5.			IN	A

;; AUTHORITY SECTION:
.			159	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:23:18 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 5.81.217.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 5.81.217.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.206.221.18 attack
Bad bot/spoofed identity
2020-04-22 21:52:11
184.105.139.77 attack
Port probing on unauthorized port 6379
2020-04-22 22:15:12
114.220.238.72 attackspam
SSH authentication failure x 6 reported by Fail2Ban
...
2020-04-22 21:55:19
218.28.238.165 attackbots
Apr 22 13:42:38 ns382633 sshd\[23700\]: Invalid user 47.99.142.229 from 218.28.238.165 port 42078
Apr 22 13:42:38 ns382633 sshd\[23700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.28.238.165
Apr 22 13:42:41 ns382633 sshd\[23700\]: Failed password for invalid user 47.99.142.229 from 218.28.238.165 port 42078 ssh2
Apr 22 14:03:41 ns382633 sshd\[27865\]: Invalid user tp from 218.28.238.165 port 53634
Apr 22 14:03:41 ns382633 sshd\[27865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.28.238.165
2020-04-22 21:47:56
49.233.90.200 attackbotsspam
Bruteforce detected by fail2ban
2020-04-22 21:50:12
178.131.53.181 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-04-22 22:01:17
103.56.197.178 attackspam
Apr 22 15:35:00 pve1 sshd[28780]: Failed password for root from 103.56.197.178 port 33441 ssh2
...
2020-04-22 22:25:43
185.74.4.17 attackbots
Apr 22 09:21:08 NPSTNNYC01T sshd[12848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.74.4.17
Apr 22 09:21:10 NPSTNNYC01T sshd[12848]: Failed password for invalid user test from 185.74.4.17 port 58572 ssh2
Apr 22 09:25:54 NPSTNNYC01T sshd[13166]: Failed password for root from 185.74.4.17 port 37229 ssh2
...
2020-04-22 22:17:03
116.179.32.150 attackbots
Bad bot/spoofed identity
2020-04-22 21:43:10
80.248.10.237 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-04-22 21:43:34
95.178.235.201 attackbotsspam
Port scan on 2 port(s): 22 8291
2020-04-22 22:22:01
78.128.113.42 attackbotsspam
Port scan
2020-04-22 21:50:47
93.202.60.104 attackspambots
Honeypot attack, port: 81, PTR: p5DCA3C68.dip0.t-ipconnect.de.
2020-04-22 22:20:57
212.64.16.31 attack
Apr 22 14:40:55 eventyay sshd[8539]: Failed password for root from 212.64.16.31 port 43302 ssh2
Apr 22 14:44:20 eventyay sshd[8562]: Failed password for root from 212.64.16.31 port 48370 ssh2
Apr 22 14:47:34 eventyay sshd[8618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.16.31
...
2020-04-22 21:48:21
111.206.221.4 attack
Bad bot/spoofed identity
2020-04-22 22:23:11

Recently Reported IPs

139.217.80.29 139.217.81.16 139.217.81.173 139.217.81.67
139.217.83.172 139.217.83.171 139.217.83.29 139.217.83.39
139.217.84.195 139.217.83.92 139.217.87.104 139.217.87.11
139.217.87.125 139.217.92.127 139.217.92.115 139.217.87.109
139.217.92.144 139.217.87.121 139.217.92.143 139.217.95.130