Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.252.2.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5367
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.252.2.7.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012902 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 12:29:12 CST 2025
;; MSG SIZE  rcvd: 104
Host info
b'Host 7.2.252.139.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 139.252.2.7.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
217.128.68.44 attackbots
Honeypot attack, port: 445, PTR: lputeaux-657-1-63-44.w217-128.abo.wanadoo.fr.
2020-03-03 16:35:22
187.178.87.159 attackbotsspam
*Port Scan* detected from 187.178.87.159 (MX/Mexico/187-178-87-159.dynamic.axtel.net). 4 hits in the last 285 seconds
2020-03-03 16:30:50
182.52.23.94 attackbotsspam
Honeypot attack, port: 445, PTR: node-4m6.pool-182-52.dynamic.totinternet.net.
2020-03-03 16:47:28
62.94.206.57 attack
Mar  3 09:08:09 vps sshd[11196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.94.206.57 
Mar  3 09:08:11 vps sshd[11196]: Failed password for invalid user user from 62.94.206.57 port 33265 ssh2
Mar  3 09:12:00 vps sshd[11398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.94.206.57 
...
2020-03-03 16:27:39
181.95.106.97 attack
DATE:2020-03-03 05:55:12, IP:181.95.106.97, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2020-03-03 16:20:12
103.119.140.188 attack
Honeypot attack, port: 445, PTR: ip-140-188.balifiber.id.
2020-03-03 16:40:10
37.134.114.77 attackspambots
Mar  3 05:55:23 163-172-32-151 sshd[15685]: Invalid user ec2-user from 37.134.114.77 port 60608
...
2020-03-03 16:17:00
219.86.135.95 attackbotsspam
port scan and connect, tcp 23 (telnet)
2020-03-03 16:19:16
45.80.65.122 attackspambots
Mar  3 05:55:23 163-172-32-151 sshd[15716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.122  user=root
Mar  3 05:55:25 163-172-32-151 sshd[15716]: Failed password for root from 45.80.65.122 port 46240 ssh2
...
2020-03-03 16:15:24
82.192.62.82 attack
Honeypot attack, port: 81, PTR: tm.82.192.62.82.dc.telemach.net.
2020-03-03 16:37:34
69.163.152.143 attackspambots
Automatic report - XMLRPC Attack
2020-03-03 16:12:33
218.92.0.173 attackbotsspam
Mar  3 08:58:57 server sshd[760642]: Failed none for root from 218.92.0.173 port 38925 ssh2
Mar  3 08:58:59 server sshd[760642]: Failed password for root from 218.92.0.173 port 38925 ssh2
Mar  3 08:59:03 server sshd[760642]: Failed password for root from 218.92.0.173 port 38925 ssh2
2020-03-03 16:44:35
139.59.180.53 attackspambots
Mar  3 08:23:41 server sshd[750656]: Failed password for invalid user test from 139.59.180.53 port 54770 ssh2
Mar  3 08:27:16 server sshd[751500]: Failed password for invalid user www from 139.59.180.53 port 52544 ssh2
Mar  3 08:30:53 server sshd[752457]: Failed password for root from 139.59.180.53 port 50314 ssh2
2020-03-03 16:23:25
146.88.240.4 attack
Mar  3 09:10:12 debian-2gb-nbg1-2 kernel: \[5482192.216226\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=146.88.240.4 DST=195.201.40.59 LEN=81 TOS=0x00 PREC=0x00 TTL=240 ID=54321 PROTO=UDP SPT=53347 DPT=389 LEN=61
2020-03-03 16:39:38
114.232.105.91 spamattack
[2020/03/03 11:10:26] [114.232.105.91:2102-0] User test@luxnetcorp.com.tw AUTH fails.
[2020/03/03 11:10:26] [114.232.105.91:2099-0] User test@luxnetcorp.com.tw AUTH fails.
[2020/03/03 11:10:26] [114.232.105.91:2100-0] User test@luxnetcorp.com.tw AUTH fails.
[2020/03/03 11:10:27] [114.232.105.91:2101-0] User test@luxnetcorp.com.tw AUTH fails.
[2020/03/03 11:10:47] [114.232.105.91:2095-0] User test@luxnetcorp.com.tw AUTH fails.
[2020/03/03 11:10:48] [114.232.105.91:2102-0] User test@luxnetcorp.com.tw AUTH fails.
[2020/03/03 11:11:08] [114.232.105.91:2101-0] User test@luxnetcorp.com.tw AUTH fails.
[2020/03/03 11:11:09] [114.232.105.91:2099-0] User test@luxnetcorp.com.tw AUTH fails.
2020-03-03 16:27:16

Recently Reported IPs

32.225.180.234 82.163.120.39 190.83.230.124 86.102.126.6
169.118.44.125 182.112.48.219 172.253.222.25 30.43.30.119
248.57.183.84 44.159.79.74 201.29.253.47 254.119.54.252
104.113.32.231 81.165.9.204 79.219.149.173 74.142.90.35
135.125.47.211 230.249.29.162 223.206.231.155 148.96.187.136