Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.6.252.195
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21769
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.6.252.195.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022400 1800 900 604800 86400

;; Query time: 168 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 18:09:59 CST 2025
;; MSG SIZE  rcvd: 106
Host info
195.252.6.139.in-addr.arpa domain name pointer p252195.public.FH-Koeln.DE.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
195.252.6.139.in-addr.arpa	name = p252195.public.FH-Koeln.DE.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
201.22.59.94 attackspam
Oct 24 10:57:28 www_kotimaassa_fi sshd[15475]: Failed password for root from 201.22.59.94 port 57116 ssh2
Oct 24 11:02:06 www_kotimaassa_fi sshd[15479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.22.59.94
...
2019-10-24 19:04:35
51.77.156.223 attackbotsspam
ssh failed login
2019-10-24 19:24:53
125.167.1.72 attackspam
Unauthorized connection attempt from IP address 125.167.1.72 on Port 445(SMB)
2019-10-24 19:21:07
176.32.70.216 attackspam
(imapd) Failed IMAP login from 176.32.70.216 (JP/Japan/ec2-176-32-70-216.ap-northeast-1.compute.amazonaws.com): 1 in the last 3600 secs
2019-10-24 19:01:04
92.119.160.106 attackbots
Oct 24 13:01:07 mc1 kernel: \[3201211.560315\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.106 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=48984 PROTO=TCP SPT=57053 DPT=28881 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 24 13:02:42 mc1 kernel: \[3201305.665377\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.106 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=6063 PROTO=TCP SPT=57053 DPT=29499 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 24 13:03:00 mc1 kernel: \[3201324.357795\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.106 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=60785 PROTO=TCP SPT=57053 DPT=28669 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-10-24 19:26:45
171.25.193.77 attackbotsspam
Oct 24 10:23:01 thevastnessof sshd[14988]: Failed password for root from 171.25.193.77 port 39595 ssh2
...
2019-10-24 19:08:48
49.88.112.118 attack
Oct 24 06:55:01 debian sshd\[10505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.118  user=root
Oct 24 06:55:03 debian sshd\[10505\]: Failed password for root from 49.88.112.118 port 44643 ssh2
Oct 24 06:55:05 debian sshd\[10505\]: Failed password for root from 49.88.112.118 port 44643 ssh2
...
2019-10-24 19:16:18
94.72.6.192 attack
Chat Spam
2019-10-24 19:21:42
220.121.58.55 attack
$f2bV_matches
2019-10-24 19:20:52
51.68.139.151 attack
Oct 24 10:05:32 thevastnessof sshd[14579]: Failed password for root from 51.68.139.151 port 47594 ssh2
...
2019-10-24 19:08:07
145.239.8.229 attack
Oct 24 12:39:26 SilenceServices sshd[2990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.8.229
Oct 24 12:39:27 SilenceServices sshd[2990]: Failed password for invalid user athlon from 145.239.8.229 port 34188 ssh2
Oct 24 12:43:05 SilenceServices sshd[3974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.8.229
2019-10-24 19:04:58
66.249.155.244 attack
SSH Brute Force, server-1 sshd[24258]: Failed password for invalid user mimapass from 66.249.155.244 port 52172 ssh2
2019-10-24 19:13:34
94.191.50.57 attackbotsspam
Oct 24 05:33:00 root sshd[16750]: Failed password for root from 94.191.50.57 port 55392 ssh2
Oct 24 05:38:32 root sshd[16794]: Failed password for root from 94.191.50.57 port 37598 ssh2
...
2019-10-24 19:33:36
185.56.153.231 attackbotsspam
Oct 24 09:58:37 icinga sshd[17793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.56.153.231 
Oct 24 09:58:40 icinga sshd[17793]: Failed password for invalid user sq from 185.56.153.231 port 56902 ssh2
Oct 24 10:06:55 icinga sshd[22791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.56.153.231 
...
2019-10-24 19:14:35
130.211.246.128 attackspam
Invalid user usuario from 130.211.246.128 port 49776
2019-10-24 18:54:46

Recently Reported IPs

171.113.245.59 210.0.134.52 148.13.198.67 149.140.57.215
103.86.73.40 180.247.96.162 96.134.182.78 181.50.87.141
173.232.49.220 32.144.228.95 140.119.227.108 170.17.155.252
129.107.122.25 117.36.14.199 142.227.48.30 47.34.70.163
181.94.89.126 67.12.79.193 224.63.244.59 236.251.108.148