Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: River Falls

Region: Wisconsin

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.225.50.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30960
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.225.50.9.			IN	A

;; AUTHORITY SECTION:
.			559	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019101900 1800 900 604800 86400

;; Query time: 111 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 20 02:07:58 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 9.50.225.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 9.50.225.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.65.219.210 attackbotsspam
Jun 27 19:36:37 journals sshd\[123870\]: Invalid user fcs from 159.65.219.210
Jun 27 19:36:37 journals sshd\[123870\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.219.210
Jun 27 19:36:39 journals sshd\[123870\]: Failed password for invalid user fcs from 159.65.219.210 port 38654 ssh2
Jun 27 19:39:42 journals sshd\[124458\]: Invalid user musikbot from 159.65.219.210
Jun 27 19:39:42 journals sshd\[124458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.219.210
...
2020-06-28 00:42:14
27.72.195.145 attackspam
Jun 27 17:10:35 onepixel sshd[358109]: Invalid user sansforensics from 27.72.195.145 port 65220
Jun 27 17:10:35 onepixel sshd[358109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.72.195.145 
Jun 27 17:10:35 onepixel sshd[358109]: Invalid user sansforensics from 27.72.195.145 port 65220
Jun 27 17:10:37 onepixel sshd[358109]: Failed password for invalid user sansforensics from 27.72.195.145 port 65220 ssh2
Jun 27 17:12:00 onepixel sshd[358895]: Invalid user josep from 27.72.195.145 port 28763
2020-06-28 01:16:16
175.119.224.64 attackbotsspam
Jun 27 14:31:57 serwer sshd\[21463\]: Invalid user jia from 175.119.224.64 port 47426
Jun 27 14:31:57 serwer sshd\[21463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.119.224.64
Jun 27 14:31:59 serwer sshd\[21463\]: Failed password for invalid user jia from 175.119.224.64 port 47426 ssh2
...
2020-06-28 01:05:34
121.186.122.216 attack
Jun 27 18:15:27 mout sshd[14818]: Invalid user sammy from 121.186.122.216 port 35058
Jun 27 18:15:30 mout sshd[14818]: Failed password for invalid user sammy from 121.186.122.216 port 35058 ssh2
Jun 27 18:15:32 mout sshd[14818]: Disconnected from invalid user sammy 121.186.122.216 port 35058 [preauth]
2020-06-28 00:52:00
222.186.175.148 attackbots
Jun 27 18:32:31 pve1 sshd[16570]: Failed password for root from 222.186.175.148 port 45298 ssh2
Jun 27 18:32:34 pve1 sshd[16570]: Failed password for root from 222.186.175.148 port 45298 ssh2
...
2020-06-28 00:49:30
95.68.118.133 attackbots
port 23
2020-06-28 00:40:41
103.199.68.247 attackspam
IP 103.199.68.247 attacked honeypot on port: 1433 at 6/27/2020 5:17:55 AM
2020-06-28 00:57:10
167.71.209.2 attackspambots
Jun 27 08:33:40 pixelmemory sshd[2605902]: Invalid user test from 167.71.209.2 port 42108
Jun 27 08:33:42 pixelmemory sshd[2605902]: Failed password for invalid user test from 167.71.209.2 port 42108 ssh2
Jun 27 08:37:35 pixelmemory sshd[2623915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.209.2  user=root
Jun 27 08:37:37 pixelmemory sshd[2623915]: Failed password for root from 167.71.209.2 port 33394 ssh2
Jun 27 08:41:29 pixelmemory sshd[2639330]: Invalid user hadoop from 167.71.209.2 port 52914
...
2020-06-28 00:59:09
119.45.142.72 attack
Jun 27 16:41:00 rocket sshd[15767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.142.72
Jun 27 16:41:02 rocket sshd[15767]: Failed password for invalid user ana from 119.45.142.72 port 57046 ssh2
...
2020-06-28 01:23:17
200.73.128.100 attackbots
2020-06-27T15:25:43.881276abusebot-3.cloudsearch.cf sshd[22181]: Invalid user montse from 200.73.128.100 port 39128
2020-06-27T15:25:43.887317abusebot-3.cloudsearch.cf sshd[22181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.73.128.100
2020-06-27T15:25:43.881276abusebot-3.cloudsearch.cf sshd[22181]: Invalid user montse from 200.73.128.100 port 39128
2020-06-27T15:25:45.589433abusebot-3.cloudsearch.cf sshd[22181]: Failed password for invalid user montse from 200.73.128.100 port 39128 ssh2
2020-06-27T15:34:11.191640abusebot-3.cloudsearch.cf sshd[22246]: Invalid user amit from 200.73.128.100 port 55418
2020-06-27T15:34:11.196048abusebot-3.cloudsearch.cf sshd[22246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.73.128.100
2020-06-27T15:34:11.191640abusebot-3.cloudsearch.cf sshd[22246]: Invalid user amit from 200.73.128.100 port 55418
2020-06-27T15:34:13.304567abusebot-3.cloudsearch.cf sshd[22246]
...
2020-06-28 00:45:35
91.121.109.45 attackspam
Jun 27 18:58:53 dev0-dcde-rnet sshd[30819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.109.45
Jun 27 18:58:55 dev0-dcde-rnet sshd[30819]: Failed password for invalid user hsk from 91.121.109.45 port 44369 ssh2
Jun 27 19:02:01 dev0-dcde-rnet sshd[30837]: Failed password for root from 91.121.109.45 port 43697 ssh2
2020-06-28 01:19:32
112.95.225.158 attackspambots
2020-06-27T18:42:10.482753+02:00  sshd[27543]: Failed password for root from 112.95.225.158 port 55402 ssh2
2020-06-28 00:59:35
123.206.190.82 attackbotsspam
Jun 27 14:18:16 hell sshd[26013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.190.82
Jun 27 14:18:18 hell sshd[26013]: Failed password for invalid user suporte from 123.206.190.82 port 44520 ssh2
...
2020-06-28 00:43:21
220.181.108.142 attackbots
Automatic report - Banned IP Access
2020-06-28 00:50:10
192.241.175.250 attackbotsspam
SSH bruteforce
2020-06-28 01:16:44

Recently Reported IPs

73.14.144.189 153.232.3.18 52.167.130.45 144.58.46.53
150.216.195.222 180.65.149.147 189.71.213.42 39.227.59.218
140.75.1.188 115.149.164.236 13.247.181.9 31.34.160.182
41.244.5.142 178.208.213.160 114.204.63.93 220.2.170.113
47.119.149.66 81.155.144.56 12.217.76.92 14.169.134.69