Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.34.242.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27160
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.34.242.70.			IN	A

;; AUTHORITY SECTION:
.			251	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010800 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 08 14:00:19 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 70.242.34.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 70.242.34.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.12.7.100 attack
Apr 11 08:28:18 plex sshd[25461]: Invalid user helpdesk from 106.12.7.100 port 37462
2020-04-11 14:53:29
222.186.175.167 attackbotsspam
Apr 11 09:09:16 pve sshd[7840]: Failed password for root from 222.186.175.167 port 30152 ssh2
Apr 11 09:09:20 pve sshd[7840]: Failed password for root from 222.186.175.167 port 30152 ssh2
Apr 11 09:09:26 pve sshd[7840]: Failed password for root from 222.186.175.167 port 30152 ssh2
Apr 11 09:09:31 pve sshd[7840]: Failed password for root from 222.186.175.167 port 30152 ssh2
2020-04-11 15:10:40
219.75.134.27 attack
Apr 11 08:46:28 nextcloud sshd\[28095\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.75.134.27  user=root
Apr 11 08:46:30 nextcloud sshd\[28095\]: Failed password for root from 219.75.134.27 port 57532 ssh2
Apr 11 09:00:28 nextcloud sshd\[14779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.75.134.27  user=root
2020-04-11 15:11:38
222.222.74.155 attackspambots
20 attempts against mh-ssh on echoip
2020-04-11 14:59:45
111.229.186.30 attackspam
Invalid user oracle from 111.229.186.30 port 42037
2020-04-11 14:37:08
105.229.52.149 attackbotsspam
Invalid user musicbot from 105.229.52.149 port 51626
2020-04-11 15:19:53
13.124.214.26 attack
Apr 11 07:47:01 pi sshd[21183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.124.214.26  user=root
Apr 11 07:47:04 pi sshd[21183]: Failed password for invalid user root from 13.124.214.26 port 41506 ssh2
2020-04-11 14:58:25
139.199.133.160 attack
Apr 11 02:27:53 ny01 sshd[17565]: Failed password for root from 139.199.133.160 port 49756 ssh2
Apr 11 02:32:43 ny01 sshd[18301]: Failed password for root from 139.199.133.160 port 46704 ssh2
2020-04-11 14:40:37
123.207.19.202 attack
Invalid user erik from 123.207.19.202 port 33558
2020-04-11 14:45:14
182.61.29.94 attack
182.61.29.94 - - [11/Apr/2020:07:11:05 +0200] "GET /wp-login.php HTTP/1.1" 200 5702 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
182.61.29.94 - - [11/Apr/2020:07:11:07 +0200] "POST /wp-login.php HTTP/1.1" 200 6601 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
182.61.29.94 - - [11/Apr/2020:07:11:09 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-04-11 14:50:50
110.188.20.58 attackspam
Apr 11 05:42:47 vserver sshd\[21648\]: Failed password for root from 110.188.20.58 port 50518 ssh2Apr 11 05:45:56 vserver sshd\[21679\]: Failed password for root from 110.188.20.58 port 43328 ssh2Apr 11 05:49:11 vserver sshd\[21725\]: Failed password for root from 110.188.20.58 port 36136 ssh2Apr 11 05:52:38 vserver sshd\[21756\]: Failed password for root from 110.188.20.58 port 57176 ssh2
...
2020-04-11 15:13:35
27.76.52.229 attackspam
1586577188 - 04/11/2020 05:53:08 Host: 27.76.52.229/27.76.52.229 Port: 445 TCP Blocked
2020-04-11 14:56:19
193.202.45.202 attackspam
193.202.45.202 was recorded 21 times by 9 hosts attempting to connect to the following ports: 5060. Incident counter (4h, 24h, all-time): 21, 21, 31
2020-04-11 15:18:34
165.227.77.120 attackspam
$f2bV_matches
2020-04-11 14:48:06
171.225.118.69 attackbotsspam
1586577193 - 04/11/2020 05:53:13 Host: 171.225.118.69/171.225.118.69 Port: 445 TCP Blocked
2020-04-11 14:52:32

Recently Reported IPs

255.32.59.233 238.237.129.22 19.7.157.241 13.7.60.11
44.90.52.109 207.122.10.49 110.211.172.135 66.215.55.192
94.116.127.27 174.207.164.166 122.125.227.245 174.93.121.41
78.46.89.68 212.98.66.177 69.230.36.135 237.254.135.238
216.251.66.163 240.185.34.62 79.69.166.54 246.196.255.38