Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: Mayekar Broadband Pvt Ltd

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attack
unauthorized connection attempt
2020-02-19 14:29:55
attackbots
Automatic report - Port Scan Attack
2020-02-05 19:32:15
Comments on same subnet:
IP Type Details Datetime
139.5.239.17 attackspambots
Automatic report - Banned IP Access
2020-02-21 04:10:23
139.5.239.17 attack
Automatic report - Banned IP Access
2019-11-11 03:51:14
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.5.239.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36873
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.5.239.139.			IN	A

;; AUTHORITY SECTION:
.			156	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020401 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 19:32:06 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 139.239.5.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.239.5.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
170.254.103.200 attackspam
Automatic report - Port Scan Attack
2020-01-02 08:08:42
222.186.175.167 attackbots
Jan  2 00:38:43 MK-Soft-Root1 sshd[2482]: Failed password for root from 222.186.175.167 port 36788 ssh2
Jan  2 00:38:47 MK-Soft-Root1 sshd[2482]: Failed password for root from 222.186.175.167 port 36788 ssh2
...
2020-01-02 07:42:30
222.186.31.83 attackspam
Jan  2 01:11:12 debian64 sshd\[19623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.83  user=root
Jan  2 01:11:14 debian64 sshd\[19623\]: Failed password for root from 222.186.31.83 port 60719 ssh2
Jan  2 01:11:17 debian64 sshd\[19623\]: Failed password for root from 222.186.31.83 port 60719 ssh2
...
2020-01-02 08:11:38
49.232.146.216 attack
Jan  2 00:47:32 vps691689 sshd[20897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.146.216
Jan  2 00:47:35 vps691689 sshd[20897]: Failed password for invalid user janderson from 49.232.146.216 port 39992 ssh2
Jan  2 00:50:32 vps691689 sshd[20988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.146.216
...
2020-01-02 08:14:05
54.37.158.40 attackbotsspam
$f2bV_matches
2020-01-02 08:01:48
106.13.81.162 attackbots
Jan  2 01:40:05 server sshd\[12349\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.81.162  user=root
Jan  2 01:40:07 server sshd\[12349\]: Failed password for root from 106.13.81.162 port 56486 ssh2
Jan  2 01:51:05 server sshd\[14557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.81.162  user=mysql
Jan  2 01:51:07 server sshd\[14557\]: Failed password for mysql from 106.13.81.162 port 56396 ssh2
Jan  2 01:53:28 server sshd\[14813\]: Invalid user www from 106.13.81.162
Jan  2 01:53:28 server sshd\[14813\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.81.162 
...
2020-01-02 07:48:55
96.44.186.50 attack
(imapd) Failed IMAP login from 96.44.186.50 (US/United States/96.44.186.50.static.quadranet.com): 1 in the last 3600 secs
2020-01-02 07:44:24
49.235.227.231 attack
Too many connections or unauthorized access detected from Arctic banned ip
2020-01-02 08:10:07
139.155.151.50 attackspambots
Jan  1 22:53:10 IngegnereFirenze sshd[10094]: Failed password for invalid user ftpuser from 139.155.151.50 port 45474 ssh2
...
2020-01-02 07:59:34
45.168.58.52 attackspam
DATE:2020-01-01 23:53:08, IP:45.168.58.52, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-01-02 08:02:55
83.187.166.41 attackspambots
Unauthorized SSH connection attempt
2020-01-02 08:00:35
45.136.108.123 attack
Jan  2 00:58:33 debian-2gb-nbg1-2 kernel: \[182444.093104\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.136.108.123 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=20079 PROTO=TCP SPT=49898 DPT=6032 WINDOW=1024 RES=0x00 SYN URGP=0
2020-01-02 08:01:09
36.41.174.139 attack
$f2bV_matches
2020-01-02 07:40:51
190.191.194.9 attackbotsspam
Jan  2 00:54:28 vpn01 sshd[2056]: Failed password for root from 190.191.194.9 port 58361 ssh2
Jan  2 00:56:42 vpn01 sshd[2064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.191.194.9
...
2020-01-02 08:19:38
188.80.50.127 attackbotsspam
Jan  1 19:53:22 ws22vmsma01 sshd[160221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.80.50.127
Jan  1 19:53:24 ws22vmsma01 sshd[160221]: Failed password for invalid user amano from 188.80.50.127 port 49674 ssh2
...
2020-01-02 07:51:14

Recently Reported IPs

103.51.44.102 101.128.72.200 95.53.79.172 89.186.84.150
83.143.31.38 77.236.93.28 77.120.146.154 59.127.130.207
59.127.11.50 46.176.6.91 46.158.49.229 42.116.158.1
31.223.122.231 31.207.73.51 23.129.64.224 2.134.242.89
222.80.41.132 221.201.251.125 221.154.110.186 218.32.154.131