Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.248.12.193
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58869
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.248.12.193.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 157 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 06:12:56 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 193.12.248.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 193.12.248.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
182.61.29.126 attackbots
May 13 21:35:57 marvibiene sshd[12288]: Invalid user system from 182.61.29.126 port 42830
May 13 21:35:57 marvibiene sshd[12288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.29.126
May 13 21:35:57 marvibiene sshd[12288]: Invalid user system from 182.61.29.126 port 42830
May 13 21:35:59 marvibiene sshd[12288]: Failed password for invalid user system from 182.61.29.126 port 42830 ssh2
...
2020-05-14 07:25:57
64.227.58.213 attack
May 13 16:39:30 server1 sshd\[15028\]: Failed password for root from 64.227.58.213 port 58090 ssh2
May 13 16:43:28 server1 sshd\[16760\]: Invalid user syftp from 64.227.58.213
May 13 16:43:28 server1 sshd\[16760\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.58.213 
May 13 16:43:30 server1 sshd\[16760\]: Failed password for invalid user syftp from 64.227.58.213 port 39508 ssh2
May 13 16:47:19 server1 sshd\[18374\]: Invalid user deploy from 64.227.58.213
...
2020-05-14 06:47:55
198.71.226.13 attack
Automatic report - XMLRPC Attack
2020-05-14 06:58:50
185.56.153.236 attack
Invalid user jenkins from 185.56.153.236 port 33110
2020-05-14 07:02:38
58.222.107.253 attackbotsspam
May 14 00:18:36 localhost sshd\[24985\]: Invalid user rj from 58.222.107.253
May 14 00:18:36 localhost sshd\[24985\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.222.107.253
May 14 00:18:38 localhost sshd\[24985\]: Failed password for invalid user rj from 58.222.107.253 port 21035 ssh2
May 14 00:23:26 localhost sshd\[25231\]: Invalid user ubuntu from 58.222.107.253
May 14 00:23:26 localhost sshd\[25231\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.222.107.253
...
2020-05-14 07:15:11
167.71.72.70 attackbotsspam
Invalid user ntadmin from 167.71.72.70 port 57110
2020-05-14 07:10:05
175.100.18.237 attack
13.05.2020 23:07:21 - SMTP Spam without Auth on hMailserver 
Detected by ELinOX-hMail-A2F
2020-05-14 07:08:32
51.178.55.92 attack
May 13 21:42:07 ws26vmsma01 sshd[186960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.55.92
May 13 21:42:08 ws26vmsma01 sshd[186960]: Failed password for invalid user deploy from 51.178.55.92 port 50108 ssh2
...
2020-05-14 06:57:54
157.245.54.200 attackbots
May 14 00:44:35 PorscheCustomer sshd[5504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.54.200
May 14 00:44:36 PorscheCustomer sshd[5504]: Failed password for invalid user php from 157.245.54.200 port 42786 ssh2
May 14 00:48:44 PorscheCustomer sshd[5679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.54.200
...
2020-05-14 07:07:17
190.28.118.3 attackbotsspam
Excessive Port-Scanning
2020-05-14 07:21:30
45.55.176.173 attackbots
May 13 22:25:58 game-panel sshd[12949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.176.173
May 13 22:26:00 game-panel sshd[12949]: Failed password for invalid user user from 45.55.176.173 port 53979 ssh2
May 13 22:29:19 game-panel sshd[13117]: Failed password for games from 45.55.176.173 port 57539 ssh2
2020-05-14 06:50:06
2.50.34.153 attackspambots
1589404028 - 05/13/2020 23:07:08 Host: 2.50.34.153/2.50.34.153 Port: 445 TCP Blocked
2020-05-14 07:13:54
41.159.18.20 attackbots
SSH Invalid Login
2020-05-14 07:02:00
222.186.169.192 attackbotsspam
May 14 00:24:41 vpn01 sshd[4357]: Failed password for root from 222.186.169.192 port 37428 ssh2
...
2020-05-14 07:11:50
79.137.72.121 attackspam
May 13 20:17:18 ws22vmsma01 sshd[121658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.72.121
May 13 20:17:21 ws22vmsma01 sshd[121658]: Failed password for invalid user admin from 79.137.72.121 port 45314 ssh2
...
2020-05-14 07:17:46

Recently Reported IPs

240.73.224.45 152.92.83.149 74.175.143.209 176.121.155.186
207.245.59.243 179.196.181.185 116.106.74.113 185.185.55.42
244.67.56.31 28.177.120.171 233.96.57.103 194.103.119.53
13.113.76.177 106.224.122.44 90.107.0.152 58.221.193.247
217.140.99.214 142.126.166.173 192.99.254.30 239.15.45.157