Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Columbus

Region: Ohio

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.251.149.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29796
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.251.149.214.		IN	A

;; AUTHORITY SECTION:
.			552	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110102 1800 900 604800 86400

;; Query time: 137 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 02 12:09:29 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 214.149.251.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 214.149.251.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
39.78.104.25 attack
Port scan on 1 port(s): 23
2020-03-26 13:56:35
51.254.49.100 attackbotsspam
" "
2020-03-26 14:25:25
79.174.24.33 attack
Unauthorized connection attempt detected from IP address 79.174.24.33 to port 1433
2020-03-26 14:19:28
51.38.126.92 attack
Invalid user chile from 51.38.126.92 port 39616
2020-03-26 14:14:14
148.70.128.197 attack
Mar 26 00:46:17 NPSTNNYC01T sshd[22668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.128.197
Mar 26 00:46:19 NPSTNNYC01T sshd[22668]: Failed password for invalid user ho from 148.70.128.197 port 54988 ssh2
Mar 26 00:49:22 NPSTNNYC01T sshd[22885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.128.197
...
2020-03-26 14:16:57
35.186.145.141 attack
*Port Scan* detected from 35.186.145.141 (SG/Singapore/-/Singapore (Queenstown Estate)/141.145.186.35.bc.googleusercontent.com). 4 hits in the last 140 seconds
2020-03-26 13:58:17
103.207.11.10 attack
Invalid user ginny from 103.207.11.10 port 47152
2020-03-26 14:35:08
200.122.251.186 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2020-03-26 14:39:25
147.135.233.199 attack
Invalid user frolov from 147.135.233.199 port 41656
2020-03-26 14:34:36
68.127.49.11 attackspambots
Invalid user user from 68.127.49.11 port 46564
2020-03-26 14:06:08
106.54.241.222 attackspambots
Invalid user th from 106.54.241.222 port 48994
2020-03-26 14:05:21
121.160.117.115 attackbots
DATE:2020-03-26 04:49:05, IP:121.160.117.115, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-03-26 14:31:48
61.84.196.50 attackspambots
Invalid user user from 61.84.196.50 port 34716
2020-03-26 14:28:58
18.216.205.70 attackbots
" "
2020-03-26 14:33:10
211.220.21.233 attackbots
20/3/25@23:53:15: FAIL: Alarm-Telnet address from=211.220.21.233
...
2020-03-26 14:11:38

Recently Reported IPs

24.82.122.130 23.95.83.35 27.217.18.104 214.208.79.96
178.181.17.7 217.5.141.140 251.74.34.234 3.8.68.2
15.187.238.44 111.158.133.94 212.230.88.63 142.171.131.254
45.14.242.11 97.123.64.3 20.85.147.95 148.72.90.78
146.210.108.94 92.195.83.73 234.105.12.225 174.23.244.160