Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.231.34.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24441
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.231.34.117.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 17:16:27 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 117.34.231.139.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 139.231.34.117.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
37.49.229.190 attack
[2020-04-22 11:21:00] NOTICE[1170][C-000038b9] chan_sip.c: Call from '' (37.49.229.190:41496) to extension '0048323395006' rejected because extension not found in context 'public'.
[2020-04-22 11:21:00] SECURITY[1184] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-22T11:21:00.990-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0048323395006",SessionID="0x7f6c0824ccd8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.49.229.190/5060",ACLName="no_extension_match"
[2020-04-22 11:23:03] NOTICE[1170][C-000038bb] chan_sip.c: Call from '' (37.49.229.190:16101) to extension '0048323395006' rejected because extension not found in context 'public'.
[2020-04-22 11:23:03] SECURITY[1184] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-22T11:23:03.999-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0048323395006",SessionID="0x7f6c082b17a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.49.229
...
2020-04-22 23:25:58
104.248.130.10 attack
Bruteforce detected by fail2ban
2020-04-22 23:19:37
103.242.56.183 attackbots
Apr 22 17:43:03 server sshd[22411]: Failed password for root from 103.242.56.183 port 39098 ssh2
Apr 22 17:45:21 server sshd[22682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.242.56.183
Apr 22 17:45:22 server sshd[22682]: Failed password for invalid user ma from 103.242.56.183 port 53989 ssh2
...
2020-04-22 23:54:06
180.148.2.26 attackspambots
Unauthorized connection attempt from IP address 180.148.2.26 on Port 445(SMB)
2020-04-22 23:50:37
110.241.189.207 attack
Apr 22 13:53:45 www6-3 sshd[3433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.241.189.207  user=r.r
Apr 22 13:53:48 www6-3 sshd[3433]: Failed password for r.r from 110.241.189.207 port 59220 ssh2
Apr 22 13:53:48 www6-3 sshd[3433]: Received disconnect from 110.241.189.207 port 59220:11: Bye Bye [preauth]
Apr 22 13:53:48 www6-3 sshd[3433]: Disconnected from 110.241.189.207 port 59220 [preauth]
Apr 22 13:59:59 www6-3 sshd[3781]: Invalid user admin from 110.241.189.207 port 47686
Apr 22 13:59:59 www6-3 sshd[3781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.241.189.207
Apr 22 14:00:01 www6-3 sshd[3781]: Failed password for invalid user admin from 110.241.189.207 port 47686 ssh2
Apr 22 14:00:01 www6-3 sshd[3781]: Received disconnect from 110.241.189.207 port 47686:11: Bye Bye [preauth]
Apr 22 14:00:01 www6-3 sshd[3781]: Disconnected from 110.241.189.207 port 47686 [preauth]


........
----------------------------------
2020-04-22 23:56:12
185.175.93.15 attackspam
Apr 22 17:22:23 debian-2gb-nbg1-2 kernel: \[9827896.628253\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.175.93.15 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=47950 PROTO=TCP SPT=45252 DPT=63099 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-22 23:29:59
159.89.3.128 attackspam
(sshd) Failed SSH login from 159.89.3.128 (DE/Germany/-): 5 in the last 3600 secs
2020-04-22 23:33:34
111.206.221.45 attack
Bad bot/spoofed identity
2020-04-22 23:36:04
41.63.1.38 attack
SSH invalid-user multiple login attempts
2020-04-22 23:25:40
84.214.176.227 attack
Apr 22 14:02:01 cloud sshd[30481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.214.176.227 
Apr 22 14:02:03 cloud sshd[30481]: Failed password for invalid user ye from 84.214.176.227 port 39758 ssh2
2020-04-22 23:51:08
185.14.187.133 attackspambots
k+ssh-bruteforce
2020-04-22 23:37:14
14.232.208.210 attack
1587556946 - 04/22/2020 14:02:26 Host: 14.232.208.210/14.232.208.210 Port: 445 TCP Blocked
2020-04-22 23:22:47
81.31.224.134 attackbotsspam
Unauthorized connection attempt from IP address 81.31.224.134 on Port 445(SMB)
2020-04-22 23:18:02
178.62.104.59 attack
Apr 22 12:12:06 XXX sshd[3575]: Invalid user ms from 178.62.104.59 port 57422
2020-04-22 23:28:22
93.177.103.47 attack
Apr 22 21:50:18 our-server-hostname postfix/smtpd[15204]: connect from unknown[93.177.103.47]
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr 22 21:50:33 our-server-hostname postfix/smtpd[15204]: disconnect from unknown[93.177.103.47]
Apr 22 21:51:06 our-server-hostname postfix/smtpd[16599]: connect from unknown[93.177.103.47]
Apr x@x
Apr 22 21:51:10 our-server-hostname postfix/smtpd[16599]: disconnect from unknown[93.177.103.47]
Apr 22 21:51:19 our-server-hostname postfix/smtpd[16451]: connect from unknown[93.177.103.47]
Apr x@x
Apr 22 21:51:26 our-server-hostname postfix/smtpd[16451]: disconnect from unknown[93.177.103.47]
Apr 22 21:51:49 our-server-hostname postfix/smtpd[16451]: connect from unknown[93.177.103.47]
Apr x@x
Apr 22 21:51:52 our-server-hostname postfix/smtpd[16451]: disconnect from unknown[93.177.103.47]
Apr 22 21:52:51 our-server-hostname postfix/smtpd[16771]: connect from unknown[93.177.103.47]
Apr x@x
Apr 22 21:52:54 our-server-hostname postfix/smtpd[16771]: disc........
-------------------------------
2020-04-22 23:34:14

Recently Reported IPs

244.53.172.163 189.38.166.220 26.252.0.83 33.36.97.221
242.62.88.57 255.189.56.95 249.16.225.196 108.231.120.122
204.130.193.211 133.196.81.105 21.59.236.54 40.30.46.175
179.241.117.99 235.235.222.207 48.81.123.90 221.42.56.189
205.113.110.104 80.191.41.201 220.15.255.105 55.108.19.171