Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Amsterdam

Region: North Holland

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
139.28.217.201 attack
"free-seo-tools" webspam via our contact form.
2020-08-30 07:15:33
139.28.217.90 attack
3069	31.03.2020 17:49:55	Ошибки входа	admin	139.28.217.90	/bitrix/admin/
2020-03-31 23:29:14
139.28.217.222 attackbots
Automatic report - Banned IP Access
2019-08-16 11:38:57
139.28.217.90 attack
Brute forcing Wordpress login
2019-08-13 14:17:56
Whois info:
b
Dig info:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 139.28.217.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31589
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;139.28.217.196.			IN	A

;; Query time: 1 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Sat Jun 26 17:41:46 CST 2021
;; MSG SIZE  rcvd: 43

'
Host info
Host 196.217.28.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 196.217.28.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
109.233.121.250 attackspambots
109.233.121.250 - - [07/Aug/2020:07:36:24 +0200] "POST /xmlrpc.php HTTP/1.1" 403 15447 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
109.233.121.250 - - [07/Aug/2020:07:59:51 +0200] "POST /xmlrpc.php HTTP/1.1" 403 613 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-07 18:24:37
157.245.77.151 attackspambots
failed_logins
2020-08-07 18:23:54
194.26.29.146 attackbots
SmallBizIT.US 9 packets to tcp(35132,35324,35499,36186,36257,36510,36537,36747,36909)
2020-08-07 18:40:42
35.204.70.38 attack
Aug  7 06:52:14 server sshd[16576]: Failed password for root from 35.204.70.38 port 34138 ssh2
Aug  7 06:56:10 server sshd[21509]: Failed password for root from 35.204.70.38 port 45234 ssh2
Aug  7 07:00:09 server sshd[26848]: Failed password for root from 35.204.70.38 port 56330 ssh2
2020-08-07 18:22:20
79.127.126.198 attackspambots
Automatic report - Banned IP Access
2020-08-07 18:51:37
172.58.190.203 attackspam
Malicious Traffic/Form Submission
2020-08-07 18:54:23
167.99.8.129 attackbots
TCP port : 5207
2020-08-07 18:23:23
123.125.194.150 attack
2020-08-06 UTC: (67x) - root(67x)
2020-08-07 18:24:17
144.217.216.29 attack
Received: from emm-114.e-mail-master.com.br (emm-114.e-mail-master.com.br [144.217.216.29])
microsoft.com
http://espie.e-mail-master.com.br
http://loja.asus.com.br
ovh.net
2020-08-07 18:52:35
5.187.1.107 attackspambots
Automatic report generated by Wazuh
2020-08-07 18:43:00
218.50.223.112 attack
Aug  7 12:31:50 piServer sshd[28746]: Failed password for root from 218.50.223.112 port 52208 ssh2
Aug  7 12:34:52 piServer sshd[29058]: Failed password for root from 218.50.223.112 port 39002 ssh2
...
2020-08-07 18:40:24
123.16.236.0 attack
Icarus honeypot on github
2020-08-07 18:29:56
94.102.51.95 attackbotsspam
 TCP (SYN) 94.102.51.95:59349 -> port 64508, len 44
2020-08-07 18:43:50
120.29.85.189 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-08-07 18:36:22
45.95.168.112 attackspambots
Unauthorized connection attempt detected from IP address 45.95.168.112 to port 8088 [T]
2020-08-07 18:18:22

Recently Reported IPs

183.62.140.38 111.21.255.3 60.29.37.54 61.141.124.22
116.23.127.99 114.35.104.177 113.66.5.0 181.188.160.132
95.185.171.87 188.146.67.65 202.29.244.70 190.234.163.194
121.131.75.103 113.210.126.156 40.143.178.206 82.102.25.134
198.71.238.2 207.46.13.232 24.157.197.194 66.102.6.179