Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.95.4.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46734
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.95.4.52.			IN	A

;; AUTHORITY SECTION:
.			319	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 12:41:48 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 52.4.95.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 52.4.95.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
92.118.37.84 attack
Jun 23 23:53:58 h2177944 kernel: \[2670800.458321\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.84 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=55193 PROTO=TCP SPT=41610 DPT=49225 WINDOW=1024 RES=0x00 SYN URGP=0 
Jun 23 23:54:28 h2177944 kernel: \[2670830.696368\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.84 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=39771 PROTO=TCP SPT=41610 DPT=3774 WINDOW=1024 RES=0x00 SYN URGP=0 
Jun 23 23:54:41 h2177944 kernel: \[2670843.130276\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.84 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=45116 PROTO=TCP SPT=41610 DPT=23010 WINDOW=1024 RES=0x00 SYN URGP=0 
Jun 23 23:54:48 h2177944 kernel: \[2670849.770111\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.84 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=56572 PROTO=TCP SPT=41610 DPT=45412 WINDOW=1024 RES=0x00 SYN URGP=0 
Jun 23 23:55:07 h2177944 kernel: \[2670869.597258\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.84 DST=85.214.117.9 L
2019-06-24 06:58:14
187.188.191.47 attack
Jun 23 22:04:18 SilenceServices sshd[20966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.188.191.47
Jun 23 22:04:20 SilenceServices sshd[20966]: Failed password for invalid user fatimac from 187.188.191.47 port 54718 ssh2
Jun 23 22:05:36 SilenceServices sshd[21615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.188.191.47
2019-06-24 06:55:59
67.225.129.251 attackspam
TCP src-port=43684   dst-port=25    dnsbl-sorbs abuseat-org barracuda         (1162)
2019-06-24 06:26:04
191.217.84.226 attackbots
Jun 24 00:36:02 dev sshd\[24742\]: Invalid user oracle from 191.217.84.226 port 35885
Jun 24 00:36:02 dev sshd\[24742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.217.84.226
...
2019-06-24 06:36:41
178.159.7.11 attackbotsspam
Jun 24 00:10:28 mail postfix/smtpd\[31537\]: warning: unknown\[178.159.7.11\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 24 00:11:34 mail postfix/smtpd\[32499\]: warning: unknown\[178.159.7.11\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 24 00:12:40 mail postfix/smtpd\[32499\]: warning: unknown\[178.159.7.11\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-24 06:21:51
150.95.66.109 attackspam
Jun 23 22:06:44 www sshd\[26686\]: Invalid user ts from 150.95.66.109 port 55632
...
2019-06-24 06:27:53
185.137.111.188 attack
Jun 24 00:35:02 mail postfix/smtpd\[28622\]: warning: unknown\[185.137.111.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 24 00:35:39 mail postfix/smtpd\[27462\]: warning: unknown\[185.137.111.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 24 00:36:15 mail postfix/smtpd\[19123\]: warning: unknown\[185.137.111.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-24 06:43:12
213.156.112.218 attack
Jun 23 12:49:10 spidey sshd[3924]: Invalid user support from 213.156.112.218 port 48686
Jun 23 12:49:17 spidey sshd[4053]: Invalid user ubnt from 213.156.112.218 port 59110
Jun 23 12:50:51 spidey sshd[4142]: Invalid user cisco from 213.156.112.218 port 41148


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=213.156.112.218
2019-06-24 06:27:22
105.226.252.209 attack
TCP Port: 25 _    invalid blocked dnsbl-sorbs abuseat-org _  _  _ _ (1049)
2019-06-24 06:21:23
216.218.206.106 attackspam
Unauthorized connection attempt from IP address 216.218.206.106 on Port 445(SMB)
2019-06-24 06:35:09
178.150.216.229 attack
Jun 24 00:15:25 ovpn sshd\[16618\]: Invalid user dm from 178.150.216.229
Jun 24 00:15:25 ovpn sshd\[16618\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.150.216.229
Jun 24 00:15:26 ovpn sshd\[16618\]: Failed password for invalid user dm from 178.150.216.229 port 37138 ssh2
Jun 24 00:17:58 ovpn sshd\[16624\]: Invalid user cornelius from 178.150.216.229
Jun 24 00:17:58 ovpn sshd\[16624\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.150.216.229
2019-06-24 06:25:45
218.92.0.209 attack
Jun 23 22:07:13 ip-172-31-62-245 sshd\[19517\]: Failed password for root from 218.92.0.209 port 61737 ssh2\
Jun 23 22:07:27 ip-172-31-62-245 sshd\[19519\]: Failed password for root from 218.92.0.209 port 44589 ssh2\
Jun 23 22:07:43 ip-172-31-62-245 sshd\[19521\]: Failed password for root from 218.92.0.209 port 28659 ssh2\
Jun 23 22:07:45 ip-172-31-62-245 sshd\[19521\]: Failed password for root from 218.92.0.209 port 28659 ssh2\
Jun 23 22:07:47 ip-172-31-62-245 sshd\[19521\]: Failed password for root from 218.92.0.209 port 28659 ssh2\
2019-06-24 06:52:47
209.17.96.250 attackspam
firewall-block, port(s): 137/udp
2019-06-24 06:57:18
92.117.54.183 attackspam
Jun 23 20:53:04 vps82406 sshd[28228]: Invalid user pi from 92.117.54.183
Jun 23 20:53:04 vps82406 sshd[28228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.117.54.183 
Jun 23 20:53:04 vps82406 sshd[28230]: Invalid user pi from 92.117.54.183
Jun 23 20:53:04 vps82406 sshd[28230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.117.54.183 
Jun 23 20:53:06 vps82406 sshd[28228]: Failed password for invalid user pi from 92.117.54.183 port 50106 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=92.117.54.183
2019-06-24 06:33:03
191.83.110.255 attack
Jun 23 22:05:38 mail1 sshd\[25619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.83.110.255  user=root
Jun 23 22:05:41 mail1 sshd\[25619\]: Failed password for root from 191.83.110.255 port 39625 ssh2
Jun 23 22:05:43 mail1 sshd\[25619\]: Failed password for root from 191.83.110.255 port 39625 ssh2
Jun 23 22:05:45 mail1 sshd\[25619\]: Failed password for root from 191.83.110.255 port 39625 ssh2
Jun 23 22:05:48 mail1 sshd\[25619\]: Failed password for root from 191.83.110.255 port 39625 ssh2
...
2019-06-24 06:53:11

Recently Reported IPs

139.99.122.139 139.91.247.1 139.99.120.119 139.99.130.132
139.99.121.239 139.99.124.221 139.99.139.102 139.99.136.2
139.99.141.192 139.99.126.148 139.99.125.196 139.99.153.235
139.99.144.25 139.99.145.17 139.99.185.212 139.99.186.63
139.99.208.153 139.99.223.242 139.99.200.40 139.99.203.235