Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.248.161.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8598
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.248.161.161.		IN	A

;; AUTHORITY SECTION:
.			489	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022013101 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 01 03:07:54 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 161.161.248.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 161.161.248.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
86.252.251.146 attackbotsspam
Invalid user teamspeak1 from 86.252.251.146 port 34870
2020-03-23 22:14:59
189.148.60.238 attack
Unauthorized connection attempt from IP address 189.148.60.238 on Port 445(SMB)
2020-03-23 22:35:35
222.112.30.116 attackbots
Mar 21 19:27:49 sip sshd[7643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.112.30.116
Mar 21 19:27:50 sip sshd[7643]: Failed password for invalid user ht from 222.112.30.116 port 39521 ssh2
Mar 21 19:29:42 sip sshd[8085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.112.30.116
2020-03-23 22:52:15
49.235.36.51 attackbotsspam
2020-03-23T10:41:23.775197v22018076590370373 sshd[28098]: Invalid user good from 49.235.36.51 port 35576
2020-03-23T10:41:23.780921v22018076590370373 sshd[28098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.36.51
2020-03-23T10:41:23.775197v22018076590370373 sshd[28098]: Invalid user good from 49.235.36.51 port 35576
2020-03-23T10:41:25.564976v22018076590370373 sshd[28098]: Failed password for invalid user good from 49.235.36.51 port 35576 ssh2
2020-03-23T10:47:56.464557v22018076590370373 sshd[15191]: Invalid user backup from 49.235.36.51 port 56708
...
2020-03-23 22:09:40
124.239.128.148 attack
[Fri Feb 21 22:16:31 2020] - Syn Flood From IP: 124.239.128.148 Port: 6000
2020-03-23 22:42:56
161.49.166.2 attackspam
[Thu Mar 12 06:17:19 2020] - Syn Flood From IP: 161.49.166.2 Port: 56387
2020-03-23 22:26:09
68.74.123.67 attack
Mar 23 09:38:45 firewall sshd[24097]: Invalid user usuario from 68.74.123.67
Mar 23 09:38:47 firewall sshd[24097]: Failed password for invalid user usuario from 68.74.123.67 port 36146 ssh2
Mar 23 09:45:14 firewall sshd[24481]: Invalid user tj from 68.74.123.67
...
2020-03-23 22:13:42
124.92.127.102 attackbotsspam
[Fri Feb 21 23:00:52 2020] - Syn Flood From IP: 124.92.127.102 Port: 6000
2020-03-23 22:39:15
178.136.235.119 attackspambots
web-1 [ssh] SSH Attack
2020-03-23 22:12:18
60.240.45.115 attackspambots
Mar 23 06:33:36 sshgateway sshd\[30520\]: Invalid user gx from 60.240.45.115
Mar 23 06:33:36 sshgateway sshd\[30520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60-240-45-115.static.tpgi.com.au
Mar 23 06:33:39 sshgateway sshd\[30520\]: Failed password for invalid user gx from 60.240.45.115 port 54684 ssh2
2020-03-23 22:20:19
41.41.192.150 attackbots
Honeypot attack, port: 445, PTR: host-41.41.192.150.tedata.net.
2020-03-23 23:01:28
189.112.179.115 attackspambots
Mar 23 15:18:19 localhost sshd\[6463\]: Invalid user zhanghw from 189.112.179.115
Mar 23 15:18:19 localhost sshd\[6463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.112.179.115
Mar 23 15:18:20 localhost sshd\[6463\]: Failed password for invalid user zhanghw from 189.112.179.115 port 38824 ssh2
Mar 23 15:23:05 localhost sshd\[6890\]: Invalid user th from 189.112.179.115
Mar 23 15:23:05 localhost sshd\[6890\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.112.179.115
...
2020-03-23 22:41:33
207.180.212.98 attackbotsspam
Host Scan
2020-03-23 22:58:07
110.78.151.34 attackspambots
[Wed Mar 11 20:59:11 2020] - Syn Flood From IP: 110.78.151.34 Port: 49616
2020-03-23 22:49:39
92.118.37.61 attack
scans 12 times in preceeding hours on the ports (in chronological order) 9685 54996 14503 9938 1034 8228 1389 28357 9528 2012 20181 24769 resulting in total of 29 scans from 92.118.37.0/24 block.
2020-03-23 22:19:26

Recently Reported IPs

77.63.11.117 109.36.132.21 183.32.104.67 241.210.63.139
153.68.88.250 20.52.93.5 207.209.204.147 93.138.40.67
228.11.101.178 47.54.253.233 51.233.51.65 42.96.79.181
151.254.125.42 251.86.19.142 131.66.233.156 223.193.9.163
60.37.175.20 246.154.107.7 246.16.34.163 251.164.8.209