Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.228.172.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14743
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.228.172.82.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 18:39:59 CST 2025
;; MSG SIZE  rcvd: 107
Host info
82.172.228.139.in-addr.arpa domain name pointer fm-dyn-139-228-172-82.fast.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
82.172.228.139.in-addr.arpa	name = fm-dyn-139-228-172-82.fast.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
83.48.42.223 attackspambots
$f2bV_matches
2019-08-08 04:57:26
211.43.196.98 attack
211.43.196.98:61242 - - [02/Aug/2019:18:25:21 +0200] "HEAD /uc_server/admin.php?m=user&a=login&iframe=&sid= HTTP/1.1" 404 -
211.43.196.98:61242 - - [02/Aug/2019:18:25:21 +0200] "HEAD / HTTP/1.1" 200 -
211.43.196.98:57567 - - [02/Aug/2019:16:57:15 +0200] "HEAD /admin/left.asp HTTP/1.1" 404 -
211.43.196.98:57567 - - [02/Aug/2019:16:57:15 +0200] "HEAD /admin/review.asp?id=1%20union%20select%201,2,3,4,5,admin,7,8,9,password,11%20%20from%20cnhww HTTP/1.1" 404 -
211.43.196.98:57567 - - [02/Aug/2019:16:57:15 +0200] "HEAD /Data21293/NYIKUGY5434231.mdb HTTP/1.1" 404 -
211.43.196.98:57567 - - [02/Aug/2019:16:57:14 +0200] "HEAD /install/index.php?_m=frontpage&_a=setting&default_tpl=jixie-110118-a16 HTTP/1.1" 404 -
211.43.196.98:57567 - - [02/Aug/2019:16:57:13 +0200] "POST /index.php?_m=mod_email&_a=do_mail HTTP/1.1" 200 7424
211.43.196.98:57567 - - [02/Aug/2019:16:57:13 +0200] "HEAD /index.php?_m=mod_email&_a=do_mail HTTP/1.1" 200 -
2019-08-08 04:49:08
5.39.77.104 attack
Aug  7 21:50:48 SilenceServices sshd[8217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.77.104
Aug  7 21:50:51 SilenceServices sshd[8217]: Failed password for invalid user zr from 5.39.77.104 port 53714 ssh2
Aug  7 21:56:11 SilenceServices sshd[11232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.77.104
2019-08-08 04:55:39
158.69.222.121 attackbotsspam
Aug  7 21:46:35 ArkNodeAT sshd\[13827\]: Invalid user ad from 158.69.222.121
Aug  7 21:46:35 ArkNodeAT sshd\[13827\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.222.121
Aug  7 21:46:38 ArkNodeAT sshd\[13827\]: Failed password for invalid user ad from 158.69.222.121 port 57800 ssh2
2019-08-08 04:14:37
49.84.251.62 attackspam
Helo
2019-08-08 04:22:20
179.33.137.117 attack
Aug  7 20:49:19 MK-Soft-VM3 sshd\[27398\]: Invalid user comercial from 179.33.137.117 port 45186
Aug  7 20:49:19 MK-Soft-VM3 sshd\[27398\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.33.137.117
Aug  7 20:49:21 MK-Soft-VM3 sshd\[27398\]: Failed password for invalid user comercial from 179.33.137.117 port 45186 ssh2
...
2019-08-08 05:02:09
165.227.122.251 attackspambots
Aug  7 20:08:38 localhost sshd\[64164\]: Invalid user zack from 165.227.122.251 port 55000
Aug  7 20:08:38 localhost sshd\[64164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.122.251
Aug  7 20:08:39 localhost sshd\[64164\]: Failed password for invalid user zack from 165.227.122.251 port 55000 ssh2
Aug  7 20:12:47 localhost sshd\[64266\]: Invalid user coleen from 165.227.122.251 port 48178
Aug  7 20:12:47 localhost sshd\[64266\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.122.251
...
2019-08-08 04:13:28
80.134.28.127 attackspambots
\[2019-08-07 21:41:45\] NOTICE\[32542\] res_pjsip/pjsip_distributor.c: Request 'REGISTER' from '\' failed for '80.134.28.127:5060' \(callid: 5C45BBA28991ADD7@80.134.28.127\) - Failed to authenticate
\[2019-08-07 21:41:45\] SECURITY\[1715\] res_security_log.c: SecurityEvent="ChallengeResponseFailed",EventTV="2019-08-07T21:41:45.517+0200",Severity="Error",Service="PJSIP",EventVersion="1",AccountID="sip219222",SessionID="5C45BBA28991ADD7@80.134.28.127",LocalAddress="IPV4/UDP/188.40.118.248/5060",RemoteAddress="IPV4/UDP/80.134.28.127/5060",Challenge="1565205105/a0ae79e729103e7fa4110ef39512777c",Response="cc28d240e22551882b3da0981bb98f9d",ExpectedResponse=""
\[2019-08-07 21:41:45\] NOTICE\[26038\] res_pjsip/pjsip_distributor.c: Request 'REGISTER' from '\' failed for '80.134.28.127:5060' \(callid: 5C45BBA28991ADD7@80.134.28.127\) - Failed to authenticate
\[2019-08-07 21:41:45\] SECURITY\[1715\] res_security_log.c: SecurityE
2019-08-08 04:23:36
148.70.212.241 attackspambots
Plus code sniffing: 
148.70.212.241 - - [05/Aug/2019:04:08:13 +0100] "POST //plus/90sec.php HTTP/1.1" 404 584 "http://[domain]//plus/90sec.php" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
2019-08-08 04:16:35
59.188.250.56 attackbotsspam
Failed password for invalid user thomas from 59.188.250.56 port 36670 ssh2
Invalid user ftpuser from 59.188.250.56 port 59592
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.188.250.56
Failed password for invalid user ftpuser from 59.188.250.56 port 59592 ssh2
Invalid user gr from 59.188.250.56 port 54334
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.188.250.56
2019-08-08 04:43:43
140.143.236.53 attackspam
Aug  7 19:45:42 MK-Soft-VM6 sshd\[19782\]: Invalid user apagar from 140.143.236.53 port 42083
Aug  7 19:45:42 MK-Soft-VM6 sshd\[19782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.236.53
Aug  7 19:45:44 MK-Soft-VM6 sshd\[19782\]: Failed password for invalid user apagar from 140.143.236.53 port 42083 ssh2
...
2019-08-08 04:17:11
145.239.88.24 attack
Aug  7 19:41:34 icinga sshd[18869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.88.24
Aug  7 19:41:37 icinga sshd[18869]: Failed password for invalid user 1234 from 145.239.88.24 port 39448 ssh2
...
2019-08-08 04:16:54
192.182.124.9 attack
2019-08-07T20:48:34.430235abusebot-5.cloudsearch.cf sshd\[10486\]: Invalid user postgres from 192.182.124.9 port 34106
2019-08-08 04:49:30
170.130.187.30 attack
Automatic report - Port Scan Attack
2019-08-08 04:46:50
106.12.199.98 attack
Aug  7 22:01:07 dev0-dcde-rnet sshd[861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.199.98
Aug  7 22:01:09 dev0-dcde-rnet sshd[861]: Failed password for invalid user demo from 106.12.199.98 port 36104 ssh2
Aug  7 22:03:22 dev0-dcde-rnet sshd[867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.199.98
2019-08-08 04:57:10

Recently Reported IPs

247.16.250.93 166.35.122.217 41.162.129.219 14.136.120.202
20.226.239.152 185.22.103.163 92.166.97.79 214.195.127.29
229.118.38.27 56.19.153.195 205.16.254.213 18.208.245.34
227.25.175.171 237.0.121.113 219.205.179.222 79.23.43.164
41.147.97.105 98.45.189.52 4.181.219.81 230.212.158.2