Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 152.94.139.10
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23385
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;152.94.139.10.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 01:23:27 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 10.139.94.152.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 10.139.94.152.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
35.192.164.77 attackbotsspam
$f2bV_matches
2020-07-20 17:14:32
49.235.74.86 attackspambots
Invalid user guest from 49.235.74.86 port 35266
2020-07-20 17:28:32
150.109.145.13 attack
Honeypot hit.
2020-07-20 17:15:49
122.51.209.252 attack
Bruteforce detected by fail2ban
2020-07-20 17:17:23
49.232.162.53 attackbotsspam
Unauthorized connection attempt detected from IP address 49.232.162.53 to port 4518
2020-07-20 17:48:20
51.77.140.110 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-07-20 17:17:49
122.165.149.75 attackspambots
$f2bV_matches
2020-07-20 17:26:19
45.43.36.235 attackspambots
Jul 20 10:24:00 ns382633 sshd\[12526\]: Invalid user lisa from 45.43.36.235 port 45392
Jul 20 10:24:00 ns382633 sshd\[12526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.43.36.235
Jul 20 10:24:02 ns382633 sshd\[12526\]: Failed password for invalid user lisa from 45.43.36.235 port 45392 ssh2
Jul 20 10:34:38 ns382633 sshd\[14560\]: Invalid user user02 from 45.43.36.235 port 45990
Jul 20 10:34:38 ns382633 sshd\[14560\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.43.36.235
2020-07-20 17:23:37
151.80.67.240 attackbots
Jul 20 02:01:56 ny01 sshd[18649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.67.240
Jul 20 02:01:58 ny01 sshd[18649]: Failed password for invalid user grain from 151.80.67.240 port 41317 ssh2
Jul 20 02:06:19 ny01 sshd[19178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.67.240
2020-07-20 17:05:05
42.236.10.110 attack
Automated report (2020-07-20T11:51:47+08:00). Scraper detected at this address.
2020-07-20 17:42:27
183.166.171.187 attack
Jul 20 05:51:18 srv01 postfix/smtpd\[19898\]: warning: unknown\[183.166.171.187\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 20 05:51:29 srv01 postfix/smtpd\[19898\]: warning: unknown\[183.166.171.187\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 20 05:51:45 srv01 postfix/smtpd\[19898\]: warning: unknown\[183.166.171.187\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 20 05:52:04 srv01 postfix/smtpd\[19898\]: warning: unknown\[183.166.171.187\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 20 05:52:16 srv01 postfix/smtpd\[19898\]: warning: unknown\[183.166.171.187\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-20 17:09:00
42.236.10.73 attack
Automatic report - Banned IP Access
2020-07-20 17:23:49
139.199.30.155 attack
Failed password for invalid user robert from 139.199.30.155 port 58610 ssh2
2020-07-20 17:29:33
51.178.40.97 attack
Jul 20 10:51:36 vps639187 sshd\[18751\]: Invalid user deploy from 51.178.40.97 port 55660
Jul 20 10:51:36 vps639187 sshd\[18751\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.40.97
Jul 20 10:51:38 vps639187 sshd\[18751\]: Failed password for invalid user deploy from 51.178.40.97 port 55660 ssh2
...
2020-07-20 17:13:17
107.180.71.116 attackspam
CMS (WordPress or Joomla) login attempt.
2020-07-20 17:38:04

Recently Reported IPs

201.174.88.99 82.248.198.88 202.232.75.54 130.147.33.224
244.135.27.9 225.210.56.146 154.104.141.80 51.236.75.159
45.163.5.250 249.133.197.72 190.1.232.153 168.227.50.33
36.47.213.89 176.97.109.125 251.151.243.123 193.215.78.9
123.97.55.118 44.168.209.194 37.179.25.96 178.156.215.116