Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.50.81.246
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36929
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.50.81.246.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012500 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 00:56:09 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 246.81.50.139.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 139.50.81.246.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
34.92.111.85 attackspam
Mar  3 22:28:45 localhost sshd\[25246\]: Invalid user ftpuser from 34.92.111.85 port 52252
Mar  3 22:28:45 localhost sshd\[25246\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.92.111.85
Mar  3 22:28:46 localhost sshd\[25246\]: Failed password for invalid user ftpuser from 34.92.111.85 port 52252 ssh2
2020-03-04 05:52:28
107.175.21.170 attackbotsspam
suspicious action Tue, 03 Mar 2020 10:19:33 -0300
2020-03-04 05:59:54
113.53.103.73 attack
REQUESTED PAGE: /wp-admin/edit.php?page=wp-db-backup.php&backup=../wp-config.php
2020-03-04 05:38:57
146.185.175.132 attackbotsspam
Mar  3 20:45:00 server sshd[953160]: Failed password for root from 146.185.175.132 port 35908 ssh2
Mar  3 21:04:25 server sshd[961019]: Failed password for invalid user us from 146.185.175.132 port 51804 ssh2
Mar  3 21:16:52 server sshd[964737]: Failed password for invalid user qq from 146.185.175.132 port 58736 ssh2
2020-03-04 05:37:23
182.68.187.86 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 03-03-2020 13:20:10.
2020-03-04 05:29:01
78.195.178.119 attack
[ssh] SSH attack
2020-03-04 05:31:50
176.63.166.4 attack
Mar  3 16:11:31 163-172-32-151 sshd[14607]: Invalid user lihuanhuan from 176.63.166.4 port 56856
...
2020-03-04 05:49:30
198.46.154.34 attack
Scanning random ports - tries to find possible vulnerable services
2020-03-04 05:50:17
162.213.248.69 attackbots
suspicious action Tue, 03 Mar 2020 10:19:59 -0300
2020-03-04 05:43:42
144.172.92.8 attackbotsspam
Spam
2020-03-04 06:01:11
66.57.147.10 attack
ssh brute force
2020-03-04 06:00:28
45.143.220.212 attackspambots
Port 5137 scan denied
2020-03-04 06:02:18
112.165.173.193 attack
Automatic report - Port Scan Attack
2020-03-04 05:58:34
105.216.53.212 attackbotsspam
port scan and connect, tcp 23 (telnet)
2020-03-04 05:55:40
87.16.92.225 attack
Potential Command Injection Attempt
2020-03-04 05:36:32

Recently Reported IPs

205.15.27.31 152.232.115.212 117.243.226.123 124.72.39.14
204.233.78.21 254.36.231.125 162.176.71.200 27.98.60.166
190.143.203.119 47.51.242.242 211.186.217.96 14.215.112.123
83.86.12.15 44.183.106.237 22.12.151.181 6.224.219.109
255.111.37.103 229.49.199.126 209.241.255.34 74.228.238.16