Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
139.59.248.5 attack
Mar 18 02:24:27 163-172-32-151 sshd[17571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.248.5  user=root
Mar 18 02:24:28 163-172-32-151 sshd[17571]: Failed password for root from 139.59.248.5 port 36078 ssh2
...
2020-03-18 09:47:08
139.59.248.5 attackbots
Port 22 Scan, PTR: None
2020-02-14 09:28:50
139.59.248.5 attack
$f2bV_matches
2020-02-02 13:36:06
139.59.248.5 attackspam
ssh failed login
2020-01-12 00:01:51
139.59.248.5 attack
Jan  7 17:49:13 SilenceServices sshd[6362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.248.5
Jan  7 17:49:15 SilenceServices sshd[6362]: Failed password for invalid user walter from 139.59.248.5 port 47772 ssh2
Jan  7 17:51:58 SilenceServices sshd[8267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.248.5
2020-01-08 01:53:03
139.59.248.5 attackspambots
leo_www
2020-01-04 19:08:21
139.59.248.5 attackbots
Jan  3 14:08:59 plex sshd[4748]: Invalid user 1234 from 139.59.248.5 port 58938
2020-01-03 21:10:07
139.59.248.5 attackspambots
SSH/22 MH Probe, BF, Hack -
2019-12-24 18:29:27
139.59.248.5 attackspambots
Dec 22 14:43:38 MK-Soft-Root2 sshd[19589]: Failed password for root from 139.59.248.5 port 43544 ssh2
Dec 22 14:49:39 MK-Soft-Root2 sshd[20686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.248.5 
...
2019-12-22 22:17:45
139.59.248.5 attack
2019-12-21T17:35:30.697394centos sshd\[30834\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.248.5  user=mysql
2019-12-21T17:35:32.529253centos sshd\[30834\]: Failed password for mysql from 139.59.248.5 port 56420 ssh2
2019-12-21T17:44:22.987359centos sshd\[31287\]: Invalid user harborg from 139.59.248.5 port 60532
2019-12-21T17:44:22.993495centos sshd\[31287\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.248.5
2019-12-22 03:24:27
139.59.248.5 attackbots
Dec 16 07:59:55 eddieflores sshd\[317\]: Invalid user monssen from 139.59.248.5
Dec 16 07:59:55 eddieflores sshd\[317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.248.5
Dec 16 07:59:57 eddieflores sshd\[317\]: Failed password for invalid user monssen from 139.59.248.5 port 51154 ssh2
Dec 16 08:06:16 eddieflores sshd\[995\]: Invalid user brorson from 139.59.248.5
Dec 16 08:06:16 eddieflores sshd\[995\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.248.5
2019-12-17 02:22:55
139.59.248.5 attackbots
Dec 15 09:41:31 php1 sshd\[15787\]: Invalid user 123 from 139.59.248.5
Dec 15 09:41:31 php1 sshd\[15787\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.248.5
Dec 15 09:41:33 php1 sshd\[15787\]: Failed password for invalid user 123 from 139.59.248.5 port 43002 ssh2
Dec 15 09:47:41 php1 sshd\[16578\]: Invalid user melon from 139.59.248.5
Dec 15 09:47:41 php1 sshd\[16578\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.248.5
2019-12-16 03:48:54
139.59.248.5 attack
Dec  9 22:39:06 webhost01 sshd[7193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.248.5
Dec  9 22:39:07 webhost01 sshd[7193]: Failed password for invalid user Password99 from 139.59.248.5 port 44568 ssh2
...
2019-12-10 01:36:15
139.59.248.5 attackbotsspam
Dec  5 11:34:51 kapalua sshd\[18584\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.248.5  user=root
Dec  5 11:34:53 kapalua sshd\[18584\]: Failed password for root from 139.59.248.5 port 59210 ssh2
Dec  5 11:41:03 kapalua sshd\[19348\]: Invalid user victoria from 139.59.248.5
Dec  5 11:41:03 kapalua sshd\[19348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.248.5
Dec  5 11:41:05 kapalua sshd\[19348\]: Failed password for invalid user victoria from 139.59.248.5 port 42244 ssh2
2019-12-06 05:44:40
139.59.248.5 attackbots
Dec  1 01:27:37 plusreed sshd[8672]: Invalid user olia from 139.59.248.5
...
2019-12-01 17:18:54
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.59.248.32
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19422
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.59.248.32.			IN	A

;; AUTHORITY SECTION:
.			462	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 04:07:53 CST 2022
;; MSG SIZE  rcvd: 106
Host info
32.248.59.139.in-addr.arpa domain name pointer sm-web-sekawanmedia.co.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
32.248.59.139.in-addr.arpa	name = sm-web-sekawanmedia.co.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
177.99.79.102 attack
unauthorized connection attempt
2020-02-16 20:16:26
122.227.42.48 attack
unauthorized connection attempt
2020-02-16 20:51:22
42.2.201.57 attackspambots
unauthorized connection attempt
2020-02-16 20:35:11
91.85.200.209 attackspambots
23/tcp 23/tcp
[2020-02-12/16]2pkt
2020-02-16 20:53:57
31.154.87.145 attack
Automatic report - Port Scan Attack
2020-02-16 20:38:43
115.20.253.113 attack
unauthorized connection attempt
2020-02-16 20:45:07
46.39.230.13 attackspambots
unauthorized connection attempt
2020-02-16 20:38:23
118.35.52.121 attackbotsspam
unauthorized connection attempt
2020-02-16 20:37:06
42.119.17.7 attackbotsspam
unauthorized connection attempt
2020-02-16 20:20:18
45.170.87.181 attackbots
unauthorized connection attempt
2020-02-16 20:17:54
114.233.145.6 attackspam
unauthorized connection attempt
2020-02-16 20:51:47
195.214.252.21 attackspambots
unauthorized connection attempt
2020-02-16 20:22:17
220.135.79.220 attackspam
unauthorized connection attempt
2020-02-16 20:42:05
2.135.33.158 attackspambots
unauthorized connection attempt
2020-02-16 20:56:36
91.134.185.81 attackspambots
unauthorized connection attempt
2020-02-16 20:53:26

Recently Reported IPs

139.59.252.36 139.59.25.160 139.59.27.246 139.59.25.223
139.59.26.170 139.59.27.57 139.59.248.53 139.59.28.137
139.59.28.51 139.59.29.147 139.59.3.161 139.59.30.117
139.59.31.164 139.59.31.78 139.59.31.228 139.59.30.123
139.59.32.148 139.59.32.251 139.59.33.237 139.59.35.180