Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.252.2.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5367
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.252.2.7.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012902 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 12:29:12 CST 2025
;; MSG SIZE  rcvd: 104
Host info
b'Host 7.2.252.139.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 139.252.2.7.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
27.122.12.248 attackbots
Brute force VPN server
2020-02-09 20:10:21
125.44.15.80 attack
unauthorized connection attempt
2020-02-09 19:59:14
137.74.119.120 attackspam
$f2bV_matches
2020-02-09 20:14:50
14.231.93.218 attack
1581223750 - 02/09/2020 05:49:10 Host: 14.231.93.218/14.231.93.218 Port: 445 TCP Blocked
2020-02-09 20:06:05
103.23.22.244 attack
[09/Feb/2020:05:48:51 +0100] Web-Request: "GET /wp-login.php", User-Agent: "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-02-09 20:19:40
208.97.188.13 attackbotsspam
C1,WP GET /wp-login.php
2020-02-09 19:40:18
160.153.245.123 attackspambots
LAMP,DEF GET /wp-login.php
2020-02-09 20:11:35
182.184.122.221 attackbotsspam
Automatic report - Port Scan Attack
2020-02-09 20:13:32
49.88.112.72 attack
Feb  9 11:01:38 eventyay sshd[11252]: Failed password for root from 49.88.112.72 port 54622 ssh2
Feb  9 11:02:32 eventyay sshd[11256]: Failed password for root from 49.88.112.72 port 60359 ssh2
...
2020-02-09 20:04:50
80.254.104.24 attack
1581223753 - 02/09/2020 05:49:13 Host: 80.254.104.24/80.254.104.24 Port: 445 TCP Blocked
2020-02-09 20:01:52
92.43.189.33 attackbotsspam
unauthorized connection attempt
2020-02-09 19:48:00
121.122.49.234 attack
SSH Brute Force
2020-02-09 20:09:16
37.252.73.134 attackbots
Port probing on unauthorized port 23
2020-02-09 19:52:11
78.187.179.18 attackbots
Automatic report - Banned IP Access
2020-02-09 20:21:03
193.75.54.115 attackbots
port 23
2020-02-09 19:38:55

Recently Reported IPs

32.225.180.234 82.163.120.39 190.83.230.124 86.102.126.6
169.118.44.125 182.112.48.219 172.253.222.25 30.43.30.119
248.57.183.84 44.159.79.74 201.29.253.47 254.119.54.252
104.113.32.231 81.165.9.204 79.219.149.173 74.142.90.35
135.125.47.211 230.249.29.162 223.206.231.155 148.96.187.136