Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.72.254.243
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45695
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.72.254.243.			IN	A

;; AUTHORITY SECTION:
.			561	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010800 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 09 02:17:07 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 243.254.72.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 243.254.72.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
138.197.12.187 attackspambots
May 21 17:44:13 debian-2gb-nbg1-2 kernel: \[12334674.717122\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=138.197.12.187 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=54321 PROTO=TCP SPT=60993 DPT=3689 WINDOW=65535 RES=0x00 SYN URGP=0
2020-05-21 23:55:45
185.220.101.194 attack
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-05-21 23:36:26
122.51.89.18 attack
SSH invalid-user multiple login try
2020-05-21 23:44:08
195.54.160.213 attackspambots
05/21/2020-09:07:51.065220 195.54.160.213 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-21 23:39:15
111.67.195.53 attackspam
May 18 09:59:28 lamijardin sshd[21638]: Invalid user mml from 111.67.195.53
May 18 09:59:28 lamijardin sshd[21638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.195.53
May 18 09:59:29 lamijardin sshd[21638]: Failed password for invalid user mml from 111.67.195.53 port 34542 ssh2
May 18 09:59:30 lamijardin sshd[21638]: Received disconnect from 111.67.195.53 port 34542:11: Bye Bye [preauth]
May 18 09:59:30 lamijardin sshd[21638]: Disconnected from 111.67.195.53 port 34542 [preauth]
May 18 10:20:53 lamijardin sshd[21975]: Bad protocol version identification '-HSS2.0-libssh-0.6.3' from 111.67.195.53 port 42808
May 18 10:26:19 lamijardin sshd[22010]: Bad protocol version identification '-HSS2.0-libssh-0.6.3' from 111.67.195.53 port 40876
May 18 10:31:43 lamijardin sshd[22038]: Bad protocol version identification '-HSS2.0-libssh-0.6.3' from 111.67.195.53 port 38946
May 18 10:36:31 lamijardin sshd[22045]: Invalid user ilc from ........
-------------------------------
2020-05-22 00:04:31
80.82.70.194 attackbots
SmallBizIT.US 7 packets to tcp(9015,9190,9571,9739,9924,9949,9999)
2020-05-22 00:08:59
194.61.27.241 attackspambots
05/21/2020-11:31:44.500626 194.61.27.241 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-21 23:41:06
92.222.74.255 attackspam
SSH brute-force: detected 31 distinct usernames within a 24-hour window.
2020-05-21 23:28:04
51.254.205.6 attack
May 21 17:01:12 srv-ubuntu-dev3 sshd[103837]: Invalid user pfi from 51.254.205.6
May 21 17:01:12 srv-ubuntu-dev3 sshd[103837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.205.6
May 21 17:01:12 srv-ubuntu-dev3 sshd[103837]: Invalid user pfi from 51.254.205.6
May 21 17:01:14 srv-ubuntu-dev3 sshd[103837]: Failed password for invalid user pfi from 51.254.205.6 port 54324 ssh2
May 21 17:06:53 srv-ubuntu-dev3 sshd[104698]: Invalid user ids from 51.254.205.6
May 21 17:06:53 srv-ubuntu-dev3 sshd[104698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.205.6
May 21 17:06:53 srv-ubuntu-dev3 sshd[104698]: Invalid user ids from 51.254.205.6
May 21 17:06:55 srv-ubuntu-dev3 sshd[104698]: Failed password for invalid user ids from 51.254.205.6 port 34812 ssh2
May 21 17:09:42 srv-ubuntu-dev3 sshd[105125]: Invalid user jcz from 51.254.205.6
...
2020-05-21 23:25:35
139.194.75.9 attackbots
scans 2 times in preceeding hours on the ports (in chronological order) 8291 8728
2020-05-21 23:54:41
91.84.95.122 attack
probes 6 times on the port 8080
2020-05-22 00:07:13
52.4.143.42 attackbots
port scan
2020-05-21 23:52:58
113.160.198.78 attack
Unauthorized connection attempt from IP address 113.160.198.78 on Port 445(SMB)
2020-05-21 23:52:05
104.214.231.166 attackbotsspam
Unauthorized connection attempt from IP address 104.214.231.166 on Port 3389(RDP)
2020-05-21 23:33:01
118.201.65.165 attack
no
2020-05-21 23:51:39

Recently Reported IPs

106.51.248.93 67.175.7.156 65.242.33.249 29.60.244.69
236.240.107.126 176.200.119.105 24.67.140.99 114.230.248.79
68.152.87.126 51.244.204.75 128.102.239.221 161.40.1.72
43.245.152.117 75.5.82.145 186.146.153.41 15.207.154.243
146.32.25.0 112.158.99.56 45.178.172.128 179.180.163.211