Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.25.81.28
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32355
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.25.81.28.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020500 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 14:29:25 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 28.81.25.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 28.81.25.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
62.234.137.128 attackbots
Sep  1 08:34:53 server sshd[5962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.137.128 
Sep  1 08:34:53 server sshd[5962]: Invalid user baldo from 62.234.137.128 port 37380
Sep  1 08:34:55 server sshd[5962]: Failed password for invalid user baldo from 62.234.137.128 port 37380 ssh2
Sep  1 08:41:29 server sshd[8777]: Invalid user administrator from 62.234.137.128 port 34144
Sep  1 08:41:29 server sshd[8777]: Invalid user administrator from 62.234.137.128 port 34144
...
2020-09-01 15:13:33
13.95.14.234 attackspam
13.95.14.234 - - [31/Aug/2020:21:01:08 -0700] "GET /.env HTTP/1.1" 404 11793 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36"
...
2020-09-01 14:38:13
112.85.42.173 attackbotsspam
Sep  1 02:28:11 NPSTNNYC01T sshd[9425]: Failed password for root from 112.85.42.173 port 40023 ssh2
Sep  1 02:28:14 NPSTNNYC01T sshd[9425]: Failed password for root from 112.85.42.173 port 40023 ssh2
Sep  1 02:28:18 NPSTNNYC01T sshd[9425]: Failed password for root from 112.85.42.173 port 40023 ssh2
Sep  1 02:28:24 NPSTNNYC01T sshd[9425]: error: maximum authentication attempts exceeded for root from 112.85.42.173 port 40023 ssh2 [preauth]
...
2020-09-01 14:31:30
77.68.4.202 attackspambots
Sep  1 07:49:26 buvik sshd[21784]: Invalid user one from 77.68.4.202
Sep  1 07:49:26 buvik sshd[21784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.68.4.202
Sep  1 07:49:28 buvik sshd[21784]: Failed password for invalid user one from 77.68.4.202 port 51158 ssh2
...
2020-09-01 14:35:50
47.134.240.211 attackbotsspam
port
2020-09-01 15:16:59
23.129.64.200 attackspambots
Sep  1 05:52:30 mout sshd[4048]: Failed password for root from 23.129.64.200 port 17166 ssh2
Sep  1 05:52:35 mout sshd[4048]: Failed password for root from 23.129.64.200 port 17166 ssh2
Sep  1 05:52:39 mout sshd[4048]: Failed password for root from 23.129.64.200 port 17166 ssh2
2020-09-01 15:17:54
51.178.24.61 attackbotsspam
Invalid user reward from 51.178.24.61 port 56680
2020-09-01 14:51:42
113.193.25.98 attack
Sep  1 00:42:21 ws12vmsma01 sshd[9170]: Invalid user admin from 113.193.25.98
Sep  1 00:42:23 ws12vmsma01 sshd[9170]: Failed password for invalid user admin from 113.193.25.98 port 32952 ssh2
Sep  1 00:51:13 ws12vmsma01 sshd[10412]: Invalid user oracle from 113.193.25.98
...
2020-09-01 14:34:38
111.230.248.93 attackspambots
Sep  1 05:51:32 santamaria sshd\[19398\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.248.93  user=root
Sep  1 05:51:34 santamaria sshd\[19398\]: Failed password for root from 111.230.248.93 port 51718 ssh2
Sep  1 05:53:19 santamaria sshd\[19400\]: Invalid user testlab from 111.230.248.93
Sep  1 05:53:19 santamaria sshd\[19400\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.248.93
...
2020-09-01 14:50:26
112.85.42.232 attack
Sep  1 08:42:42 home sshd[3929039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.232  user=root
Sep  1 08:42:44 home sshd[3929039]: Failed password for root from 112.85.42.232 port 42104 ssh2
Sep  1 08:42:42 home sshd[3929039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.232  user=root
Sep  1 08:42:44 home sshd[3929039]: Failed password for root from 112.85.42.232 port 42104 ssh2
Sep  1 08:42:46 home sshd[3929039]: Failed password for root from 112.85.42.232 port 42104 ssh2
...
2020-09-01 15:08:13
171.25.193.78 attackspam
Time:     Tue Sep  1 04:56:55 2020 +0000
IP:       171.25.193.78 (SE/Sweden/tor-exit4-readme.dfri.se)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep  1 04:56:42 ca-1-ams1 sshd[7878]: Failed password for root from 171.25.193.78 port 59649 ssh2
Sep  1 04:56:44 ca-1-ams1 sshd[7878]: Failed password for root from 171.25.193.78 port 59649 ssh2
Sep  1 04:56:47 ca-1-ams1 sshd[7878]: Failed password for root from 171.25.193.78 port 59649 ssh2
Sep  1 04:56:50 ca-1-ams1 sshd[7878]: Failed password for root from 171.25.193.78 port 59649 ssh2
Sep  1 04:56:52 ca-1-ams1 sshd[7878]: Failed password for root from 171.25.193.78 port 59649 ssh2
2020-09-01 14:33:05
196.0.33.34 attack
Aug 31 22:52:31 mailman postfix/smtpd[20467]: warning: unknown[196.0.33.34]: SASL PLAIN authentication failed: authentication failure
2020-09-01 15:21:00
140.143.200.251 attack
Sep  1 06:57:42 home sshd[3894007]: Invalid user marin from 140.143.200.251 port 52272
Sep  1 06:57:42 home sshd[3894007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.200.251 
Sep  1 06:57:42 home sshd[3894007]: Invalid user marin from 140.143.200.251 port 52272
Sep  1 06:57:44 home sshd[3894007]: Failed password for invalid user marin from 140.143.200.251 port 52272 ssh2
Sep  1 07:00:14 home sshd[3894930]: Invalid user denis from 140.143.200.251 port 51138
...
2020-09-01 14:58:50
103.23.100.87 attack
2020-09-01T04:02:37.234604shield sshd\[1881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.23.100.87  user=ftp
2020-09-01T04:02:39.141760shield sshd\[1881\]: Failed password for ftp from 103.23.100.87 port 34742 ssh2
2020-09-01T04:06:30.334966shield sshd\[3146\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.23.100.87  user=root
2020-09-01T04:06:32.894022shield sshd\[3146\]: Failed password for root from 103.23.100.87 port 58561 ssh2
2020-09-01T04:10:16.875451shield sshd\[4400\]: Invalid user ljq from 103.23.100.87 port 54138
2020-09-01 14:34:07
206.189.130.152 attackbots
Repeated brute force against a port
2020-09-01 14:59:45

Recently Reported IPs

149.207.201.81 242.62.168.59 55.153.100.116 83.82.178.146
234.133.165.91 74.44.231.248 140.70.227.185 59.250.25.218
35.32.53.181 162.43.185.137 73.188.17.166 235.170.200.244
66.6.145.147 39.204.158.65 206.2.108.35 227.214.162.225
127.255.255.187 147.253.217.38 140.241.218.146 78.3.151.58