Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.28.246.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13026
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.28.246.68.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 12:11:36 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 68.246.28.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 68.246.28.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
183.82.36.176 attackspam
Port scan
2019-10-04 18:39:42
1.203.80.78 attack
Oct  4 10:16:26 microserver sshd[57143]: Invalid user Alaska2017 from 1.203.80.78 port 45827
Oct  4 10:16:26 microserver sshd[57143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.203.80.78
Oct  4 10:16:28 microserver sshd[57143]: Failed password for invalid user Alaska2017 from 1.203.80.78 port 45827 ssh2
Oct  4 10:22:14 microserver sshd[57868]: Invalid user P@$$word2019 from 1.203.80.78 port 35473
Oct  4 10:22:14 microserver sshd[57868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.203.80.78
Oct  4 10:33:42 microserver sshd[59293]: Invalid user Wachtwoord@123 from 1.203.80.78 port 43003
Oct  4 10:33:42 microserver sshd[59293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.203.80.78
Oct  4 10:33:44 microserver sshd[59293]: Failed password for invalid user Wachtwoord@123 from 1.203.80.78 port 43003 ssh2
Oct  4 10:39:31 microserver sshd[60038]: Invalid user Haslo@1234 from 1.203.
2019-10-04 18:52:03
171.100.0.170 attackbots
email spam
2019-10-04 18:45:48
61.183.35.44 attackbotsspam
Oct  4 12:44:29 localhost sshd\[11488\]: Invalid user user9 from 61.183.35.44
Oct  4 12:44:29 localhost sshd\[11488\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.183.35.44
Oct  4 12:44:32 localhost sshd\[11488\]: Failed password for invalid user user9 from 61.183.35.44 port 48225 ssh2
Oct  4 12:49:27 localhost sshd\[11795\]: Invalid user banjob from 61.183.35.44
Oct  4 12:49:27 localhost sshd\[11795\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.183.35.44
...
2019-10-04 19:06:59
202.62.226.26 attack
firewall-block, port(s): 445/tcp
2019-10-04 18:34:30
111.207.49.186 attackspambots
Oct  3 23:20:31 tdfoods sshd\[1501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.207.49.186  user=root
Oct  3 23:20:34 tdfoods sshd\[1501\]: Failed password for root from 111.207.49.186 port 37980 ssh2
Oct  3 23:25:22 tdfoods sshd\[1951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.207.49.186  user=root
Oct  3 23:25:24 tdfoods sshd\[1951\]: Failed password for root from 111.207.49.186 port 45546 ssh2
Oct  3 23:30:14 tdfoods sshd\[2364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.207.49.186  user=root
2019-10-04 19:01:13
137.63.184.100 attackbotsspam
SSH Brute-Forcing (ownc)
2019-10-04 18:56:15
61.219.140.192 attackspambots
firewall-block, port(s): 8080/tcp
2019-10-04 18:50:20
121.67.246.132 attackbots
Oct  4 07:09:50 www2 sshd\[36917\]: Invalid user P@$$word@1234 from 121.67.246.132Oct  4 07:09:52 www2 sshd\[36917\]: Failed password for invalid user P@$$word@1234 from 121.67.246.132 port 54904 ssh2Oct  4 07:14:36 www2 sshd\[37524\]: Invalid user Admin1@3 from 121.67.246.132
...
2019-10-04 18:37:29
42.99.180.135 attackbots
Oct  4 11:26:26 vps647732 sshd[10016]: Failed password for root from 42.99.180.135 port 57342 ssh2
...
2019-10-04 18:57:11
112.215.113.10 attackbotsspam
2019-10-04T09:57:43.033531abusebot-4.cloudsearch.cf sshd\[28430\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.215.113.10  user=root
2019-10-04 19:02:26
216.244.66.195 attack
\[Fri Oct 04 12:34:26.177799 2019\] \[access_compat:error\] \[pid 2048:tid 140102521001728\] \[client 216.244.66.195:63318\] AH01797: client denied by server configuration: /var/www/vhosts/yourdailypornvideos.com/httpdocs/category
\[Fri Oct 04 12:34:57.089958 2019\] \[access_compat:error\] \[pid 3788:tid 140102638499584\] \[client 216.244.66.195:64530\] AH01797: client denied by server configuration: /var/www/vhosts/yourdailypornvideos.com/httpdocs/tiffany-brookes-sex-with-a-salesman
\[Fri Oct 04 12:36:57.829639 2019\] \[access_compat:error\] \[pid 2048:tid 140102604928768\] \[client 216.244.66.195:31208\] AH01797: client denied by server configuration: /var/www/vhosts/yourdailypornvideos.com/httpdocs/trina-michaels-is-back-milflessons
\[Fri Oct 04 12:38:58.545424 2019\] \[access_compat:error\] \[pid 2018:tid 140102630106880\] \[client 216.244.66.195:38178\] AH01797: client denied by server configuration: /var/www/vhosts/yourdailypornvideos.com/httpdocs/adriana-remy-hindsight-part-two
...
2019-10-04 18:39:30
162.247.74.217 attackspambots
Oct  4 12:31:41 rotator sshd\[28186\]: Invalid user acid from 162.247.74.217Oct  4 12:31:44 rotator sshd\[28186\]: Failed password for invalid user acid from 162.247.74.217 port 57862 ssh2Oct  4 12:31:46 rotator sshd\[28186\]: Failed password for invalid user acid from 162.247.74.217 port 57862 ssh2Oct  4 12:31:48 rotator sshd\[28186\]: Failed password for invalid user acid from 162.247.74.217 port 57862 ssh2Oct  4 12:31:51 rotator sshd\[28186\]: Failed password for invalid user acid from 162.247.74.217 port 57862 ssh2Oct  4 12:31:54 rotator sshd\[28186\]: Failed password for invalid user acid from 162.247.74.217 port 57862 ssh2
...
2019-10-04 19:11:57
45.136.109.198 attackspambots
Port-scan: detected 120 distinct ports within a 24-hour window.
2019-10-04 18:53:57
200.206.50.66 attackbotsspam
xmlrpc attack
2019-10-04 18:44:47

Recently Reported IPs

192.3.151.1 139.189.17.20 172.88.50.24 138.85.15.38
142.93.211.62 41.249.118.141 67.24.228.237 148.210.89.217
12.188.156.130 91.222.159.223 222.94.22.212 14.213.186.182
216.235.66.155 120.243.247.241 121.85.99.125 230.134.242.6
120.156.114.143 190.25.248.226 236.119.223.161 13.242.212.136