Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.49.37.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53298
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.49.37.69.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 07:04:44 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 69.37.49.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 69.37.49.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.211.245.198 attack
Jul 14 17:08:22 web1 postfix/smtpd[31238]: warning: unknown[185.211.245.198]: SASL LOGIN authentication failed: authentication failure
...
2019-07-15 05:11:11
178.140.42.19 attackbotsspam
2019-07-14T10:20:17.685659hub.schaetter.us sshd\[1038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=broadband-178-140-42-19.ip.moscow.rt.ru  user=root
2019-07-14T10:20:19.626121hub.schaetter.us sshd\[1038\]: Failed password for root from 178.140.42.19 port 42002 ssh2
2019-07-14T10:20:21.891543hub.schaetter.us sshd\[1038\]: Failed password for root from 178.140.42.19 port 42002 ssh2
2019-07-14T10:20:23.910232hub.schaetter.us sshd\[1038\]: Failed password for root from 178.140.42.19 port 42002 ssh2
2019-07-14T10:20:26.525495hub.schaetter.us sshd\[1038\]: Failed password for root from 178.140.42.19 port 42002 ssh2
...
2019-07-15 04:56:20
190.85.203.254 attackspam
SSH Bruteforce
2019-07-15 05:31:01
79.159.192.217 attackspam
Automatic report - Banned IP Access
2019-07-15 05:09:02
185.176.26.104 attack
14.07.2019 21:17:40 Connection to port 31799 blocked by firewall
2019-07-15 05:37:45
192.144.132.172 attackbots
2019-07-14T21:18:01.116762abusebot-4.cloudsearch.cf sshd\[17182\]: Invalid user chen from 192.144.132.172 port 50270
2019-07-15 05:26:46
150.95.30.167 attack
DATE:2019-07-14 12:20:20, IP:150.95.30.167, PORT:ssh brute force auth on SSH service (patata)
2019-07-15 04:57:34
202.169.46.82 attackspambots
2019-07-14T19:42:14.756507abusebot-2.cloudsearch.cf sshd\[24503\]: Invalid user ts3 from 202.169.46.82 port 36121
2019-07-15 05:13:31
222.99.225.99 attackspam
Automatic report - Port Scan Attack
2019-07-15 05:12:45
45.252.251.15 attack
Port scan attempt detected by AWS-CCS, CTS, India
2019-07-15 04:52:27
180.167.155.237 attackspam
Jul 14 19:58:12 minden010 sshd[30766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.167.155.237
Jul 14 19:58:15 minden010 sshd[30766]: Failed password for invalid user wj from 180.167.155.237 port 59548 ssh2
Jul 14 20:02:09 minden010 sshd[32135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.167.155.237
...
2019-07-15 04:55:56
186.42.199.162 attackspambots
Automatic report - Port Scan Attack
2019-07-15 05:35:33
71.6.233.145 attackspambots
" "
2019-07-15 05:39:52
165.22.92.182 attack
Jul 14 20:47:46 ip-172-31-62-245 sshd\[12061\]: Failed password for root from 165.22.92.182 port 45144 ssh2\
Jul 14 20:47:47 ip-172-31-62-245 sshd\[12063\]: Invalid user admin from 165.22.92.182\
Jul 14 20:47:49 ip-172-31-62-245 sshd\[12063\]: Failed password for invalid user admin from 165.22.92.182 port 47358 ssh2\
Jul 14 20:47:50 ip-172-31-62-245 sshd\[12067\]: Invalid user admin from 165.22.92.182\
Jul 14 20:47:52 ip-172-31-62-245 sshd\[12067\]: Failed password for invalid user admin from 165.22.92.182 port 49552 ssh2\
2019-07-15 04:53:43
1.193.23.161 attack
Automatic report - Port Scan Attack
2019-07-15 05:06:39

Recently Reported IPs

87.72.138.242 199.58.242.63 31.36.146.161 198.152.244.173
40.111.203.30 194.207.183.102 25.74.115.67 235.178.101.248
234.63.47.6 168.30.214.87 42.253.197.26 110.32.31.192
28.7.135.115 127.202.106.224 3.201.78.250 101.134.73.186
171.36.186.58 159.226.31.1 7.137.113.223 247.247.155.81