Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.84.20.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23800
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.84.20.53.			IN	A

;; AUTHORITY SECTION:
.			3365	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060500 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 05 21:02:59 CST 2019
;; MSG SIZE  rcvd: 116

Host info
Host 53.20.84.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 53.20.84.139.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
121.229.49.85 attackbots
prod11
...
2020-05-16 07:26:10
190.72.56.229 attackspam
Brute forcing RDP port 3389
2020-05-16 07:05:23
183.234.131.100 attackspam
trying to access non-authorized port
2020-05-16 07:41:30
180.166.240.99 attackbots
Invalid user oracle from 180.166.240.99 port 51068
2020-05-16 07:14:41
139.198.122.76 attackspambots
May 16 01:01:57 eventyay sshd[12380]: Failed password for root from 139.198.122.76 port 60530 ssh2
May 16 01:10:19 eventyay sshd[12670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.122.76
May 16 01:10:21 eventyay sshd[12670]: Failed password for invalid user admin from 139.198.122.76 port 36578 ssh2
...
2020-05-16 07:25:27
183.2.247.50 attackbotsspam
Automatic report - Port Scan Attack
2020-05-16 07:18:47
61.177.125.242 attack
failed root login
2020-05-16 07:21:50
31.168.241.114 attack
Port probing on unauthorized port 81
2020-05-16 07:29:33
222.186.15.10 attackspam
May 16 01:06:59 eventyay sshd[12545]: Failed password for root from 222.186.15.10 port 23808 ssh2
May 16 01:07:02 eventyay sshd[12545]: Failed password for root from 222.186.15.10 port 23808 ssh2
May 16 01:07:04 eventyay sshd[12545]: Failed password for root from 222.186.15.10 port 23808 ssh2
...
2020-05-16 07:25:07
5.187.21.13 attackspam
SSH Invalid Login
2020-05-16 07:30:58
106.13.207.113 attackspam
$f2bV_matches
2020-05-16 07:32:09
117.35.118.42 attack
May 16 01:04:26 inter-technics sshd[10619]: Invalid user cssserver from 117.35.118.42 port 56384
May 16 01:04:26 inter-technics sshd[10619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.35.118.42
May 16 01:04:26 inter-technics sshd[10619]: Invalid user cssserver from 117.35.118.42 port 56384
May 16 01:04:28 inter-technics sshd[10619]: Failed password for invalid user cssserver from 117.35.118.42 port 56384 ssh2
May 16 01:07:37 inter-technics sshd[10864]: Invalid user practice from 117.35.118.42 port 45140
...
2020-05-16 07:12:01
119.198.236.208 attack
May 15 01:06:07 raspberrypi sshd\[28994\]: Failed password for pi from 119.198.236.208 port 56848 ssh2May 15 17:30:56 raspberrypi sshd\[30577\]: Failed password for pi from 119.198.236.208 port 52736 ssh2May 15 23:29:05 raspberrypi sshd\[7468\]: Failed password for pi from 119.198.236.208 port 51366 ssh2
...
2020-05-16 07:41:58
89.222.181.58 attackbotsspam
Invalid user testing from 89.222.181.58 port 60918
2020-05-16 07:19:20
42.112.203.0 attackbots
42.112.203.0 - - [15/May/2020:22:48:10 +0200] "GET / HTTP/1.1" 400 0 "-" "-"
2020-05-16 07:13:03

Recently Reported IPs

107.170.201.116 19.176.63.26 192.210.227.137 185.38.48.186
35.195.238.142 195.39.160.229 190.106.77.164 36.110.78.62
80.19.251.117 242.194.143.209 219.129.237.23 119.75.44.106
78.128.112.30 207.202.48.134 109.123.117.245 80.120.106.131
41.39.59.218 192.241.190.248 34.201.87.192 209.85.166.194