Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Lovell

Region: Wyoming

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 162.248.139.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43207
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;162.248.139.12.			IN	A

;; AUTHORITY SECTION:
.			432	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019102101 1800 900 604800 86400

;; Query time: 108 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 22 02:41:57 CST 2019
;; MSG SIZE  rcvd: 118
Host info
12.139.248.162.in-addr.arpa domain name pointer dyn-162-248-139-12.sub.tctwest.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
12.139.248.162.in-addr.arpa	name = dyn-162-248-139-12.sub.tctwest.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
186.4.222.45 attackspam
Sep 23 08:14:03 NPSTNNYC01T sshd[4755]: Failed password for root from 186.4.222.45 port 44134 ssh2
Sep 23 08:17:07 NPSTNNYC01T sshd[5034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.4.222.45
Sep 23 08:17:08 NPSTNNYC01T sshd[5034]: Failed password for invalid user ubuntu from 186.4.222.45 port 33966 ssh2
...
2020-09-23 21:12:35
189.192.100.139 attackspambots
Sep 23 06:14:56 OPSO sshd\[5587\]: Invalid user ding from 189.192.100.139 port 43538
Sep 23 06:14:56 OPSO sshd\[5587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.192.100.139
Sep 23 06:14:58 OPSO sshd\[5587\]: Failed password for invalid user ding from 189.192.100.139 port 43538 ssh2
Sep 23 06:19:01 OPSO sshd\[6080\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.192.100.139  user=root
Sep 23 06:19:03 OPSO sshd\[6080\]: Failed password for root from 189.192.100.139 port 48000 ssh2
2020-09-23 21:28:36
183.136.157.218 attackbots
Brute%20Force%20SSH
2020-09-23 21:23:24
51.255.109.166 attack
Found on   CINS badguys     / proto=17  .  srcport=17041  .  dstport=177  .     (3085)
2020-09-23 21:33:46
5.68.191.47 attack
5.68.191.47 - - [23/Sep/2020:13:35:01 +0200] "POST /xmlrpc.php HTTP/1.1" 403 795 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
5.68.191.47 - - [23/Sep/2020:13:36:15 +0200] "POST /xmlrpc.php HTTP/1.1" 403 795 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
...
2020-09-23 21:31:42
122.51.246.97 attack
Time:     Wed Sep 23 06:31:58 2020 +0000
IP:       122.51.246.97 (CN/China/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 23 05:56:52 3 sshd[9783]: Invalid user ian from 122.51.246.97 port 53722
Sep 23 05:56:54 3 sshd[9783]: Failed password for invalid user ian from 122.51.246.97 port 53722 ssh2
Sep 23 06:14:53 3 sshd[16141]: Invalid user cent from 122.51.246.97 port 59566
Sep 23 06:14:55 3 sshd[16141]: Failed password for invalid user cent from 122.51.246.97 port 59566 ssh2
Sep 23 06:31:55 3 sshd[23042]: Invalid user xia from 122.51.246.97 port 49710
2020-09-23 21:41:00
93.149.12.2 attack
$f2bV_matches
2020-09-23 21:18:43
177.220.174.238 attack
SSH_scan
2020-09-23 21:19:20
92.62.153.247 attackspambots
Sep 22 17:02:06 ssh2 sshd[20721]: User root from 92.62.153.247 not allowed because not listed in AllowUsers
Sep 22 17:02:06 ssh2 sshd[20721]: Failed password for invalid user root from 92.62.153.247 port 58114 ssh2
Sep 22 17:02:07 ssh2 sshd[20721]: Connection closed by invalid user root 92.62.153.247 port 58114 [preauth]
...
2020-09-23 21:33:16
36.89.25.170 attackspambots
Unauthorized connection attempt from IP address 36.89.25.170 on Port 445(SMB)
2020-09-23 21:47:06
132.145.158.230 attackspam
Sep 23 15:03:37 ip106 sshd[10925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.158.230 
Sep 23 15:03:39 ip106 sshd[10925]: Failed password for invalid user solr from 132.145.158.230 port 36380 ssh2
...
2020-09-23 21:45:53
27.8.228.133 attackbots
Found on   CINS badguys     / proto=6  .  srcport=42475  .  dstport=23  .     (3088)
2020-09-23 21:13:18
212.227.203.132 attackbots
212.227.203.132 - - [23/Sep/2020:10:29:42 +0100] "POST /wp-login.php HTTP/1.1" 200 2348 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
212.227.203.132 - - [23/Sep/2020:10:29:43 +0100] "POST /wp-login.php HTTP/1.1" 200 2345 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
212.227.203.132 - - [23/Sep/2020:10:29:43 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-23 21:38:48
188.166.172.189 attack
188.166.172.189 (GB/United Kingdom/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 23 09:00:47 server2 sshd[1074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.172.189  user=root
Sep 23 09:00:07 server2 sshd[870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.108.46  user=root
Sep 23 08:58:24 server2 sshd[32261]: Failed password for root from 151.236.37.57 port 37004 ssh2
Sep 23 09:00:09 server2 sshd[870]: Failed password for root from 128.199.108.46 port 55006 ssh2
Sep 23 08:58:58 server2 sshd[32394]: Failed password for root from 91.121.205.83 port 54246 ssh2

IP Addresses Blocked:
2020-09-23 21:47:37
109.184.35.49 attack
Unauthorized connection attempt from IP address 109.184.35.49 on Port 445(SMB)
2020-09-23 21:42:51

Recently Reported IPs

35.134.253.116 109.248.156.137 90.103.214.116 156.3.30.164
188.7.228.195 198.54.114.112 185.37.32.163 117.223.195.0
113.225.157.113 97.180.240.54 3.1.230.186 130.75.229.117
198.187.29.24 50.90.107.43 96.30.75.181 12.83.174.167
177.166.116.253 222.185.125.20 56.5.128.71 123.206.57.28