Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 17.82.20.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21323
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;17.82.20.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030201 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 03 03:22:54 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 139.20.82.17.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.20.82.17.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
208.186.16.204 attack
(sshd) Failed SSH login from 208.186.16.204 (US/United States/-): 5 in the last 3600 secs
2020-05-22 16:46:44
104.248.137.95 attackspambots
Invalid user cfo from 104.248.137.95 port 47608
2020-05-22 16:44:59
106.13.106.27 attackspambots
May 22 06:52:58 srv-ubuntu-dev3 sshd[118326]: Invalid user xsh from 106.13.106.27
May 22 06:52:58 srv-ubuntu-dev3 sshd[118326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.106.27
May 22 06:52:58 srv-ubuntu-dev3 sshd[118326]: Invalid user xsh from 106.13.106.27
May 22 06:52:59 srv-ubuntu-dev3 sshd[118326]: Failed password for invalid user xsh from 106.13.106.27 port 52630 ssh2
May 22 06:55:37 srv-ubuntu-dev3 sshd[118837]: Invalid user ekp from 106.13.106.27
May 22 06:55:37 srv-ubuntu-dev3 sshd[118837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.106.27
May 22 06:55:37 srv-ubuntu-dev3 sshd[118837]: Invalid user ekp from 106.13.106.27
May 22 06:55:39 srv-ubuntu-dev3 sshd[118837]: Failed password for invalid user ekp from 106.13.106.27 port 58824 ssh2
May 22 06:58:20 srv-ubuntu-dev3 sshd[119331]: Invalid user frz from 106.13.106.27
...
2020-05-22 16:59:45
165.227.93.39 attack
Invalid user rgl from 165.227.93.39 port 48786
2020-05-22 16:45:50
162.243.139.107 attack
Connection by 162.243.139.107 on port: 2222 got caught by honeypot at 5/22/2020 7:59:00 AM
2020-05-22 17:05:29
142.44.185.242 attackbotsspam
May 22 10:55:19 MainVPS sshd[31401]: Invalid user pbl from 142.44.185.242 port 58552
May 22 10:55:19 MainVPS sshd[31401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.185.242
May 22 10:55:19 MainVPS sshd[31401]: Invalid user pbl from 142.44.185.242 port 58552
May 22 10:55:22 MainVPS sshd[31401]: Failed password for invalid user pbl from 142.44.185.242 port 58552 ssh2
May 22 10:58:45 MainVPS sshd[1523]: Invalid user xst from 142.44.185.242 port 35342
...
2020-05-22 17:06:18
107.167.76.226 attackspam
1590119497 - 05/22/2020 05:51:37 Host: 107.167.76.226/107.167.76.226 Port: 445 TCP Blocked
2020-05-22 17:13:33
141.98.80.204 attackbots
05/22/2020-05:13:13.456591 141.98.80.204 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-22 17:14:18
117.35.118.42 attackbots
May 22 07:53:28 jane sshd[32409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.35.118.42 
May 22 07:53:30 jane sshd[32409]: Failed password for invalid user newuser from 117.35.118.42 port 47428 ssh2
...
2020-05-22 17:09:26
69.163.144.78 attackspambots
Automatically reported by fail2ban report script (mx1)
2020-05-22 16:53:54
162.243.135.102 attack
" "
2020-05-22 16:52:24
190.0.159.74 attackbots
2020-05-22T06:47:10.761072dmca.cloudsearch.cf sshd[23725]: Invalid user gbq from 190.0.159.74 port 40161
2020-05-22T06:47:10.766941dmca.cloudsearch.cf sshd[23725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=r190-0-159-74.ir-static.adinet.com.uy
2020-05-22T06:47:10.761072dmca.cloudsearch.cf sshd[23725]: Invalid user gbq from 190.0.159.74 port 40161
2020-05-22T06:47:13.589515dmca.cloudsearch.cf sshd[23725]: Failed password for invalid user gbq from 190.0.159.74 port 40161 ssh2
2020-05-22T06:54:34.595608dmca.cloudsearch.cf sshd[24175]: Invalid user yfq from 190.0.159.74 port 43301
2020-05-22T06:54:34.602059dmca.cloudsearch.cf sshd[24175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=r190-0-159-74.ir-static.adinet.com.uy
2020-05-22T06:54:34.595608dmca.cloudsearch.cf sshd[24175]: Invalid user yfq from 190.0.159.74 port 43301
2020-05-22T06:54:36.464774dmca.cloudsearch.cf sshd[24175]: Failed password for i
...
2020-05-22 16:48:10
91.193.172.154 attack
1590119536 - 05/22/2020 05:52:16 Host: 91.193.172.154/91.193.172.154 Port: 445 TCP Blocked
2020-05-22 16:56:36
103.255.113.39 attackbots
port
2020-05-22 17:13:03
62.173.147.229 attack
[2020-05-22 04:12:50] NOTICE[1157][C-000081f1] chan_sip.c: Call from '' (62.173.147.229:51477) to extension '9**16614627706' rejected because extension not found in context 'public'.
[2020-05-22 04:12:50] SECURITY[1173] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-05-22T04:12:50.727-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9**16614627706",SessionID="0x7f5f10787a08",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.173.147.229/51477",ACLName="no_extension_match"
[2020-05-22 04:18:45] NOTICE[1157][C-000081f6] chan_sip.c: Call from '' (62.173.147.229:50355) to extension '9**1116614627706' rejected because extension not found in context 'public'.
[2020-05-22 04:18:45] SECURITY[1173] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-05-22T04:18:45.438-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9**1116614627706",SessionID="0x7f5f10787a08",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/U
...
2020-05-22 17:02:25

Recently Reported IPs

99.54.204.143 70.245.25.215 93.24.153.127 242.175.19.124
142.106.136.239 177.108.129.11 156.163.221.181 54.255.225.198
80.51.14.12 22.152.221.140 48.33.225.23 181.171.157.50
64.149.62.154 92.36.103.161 4.38.156.211 188.200.229.4
30.240.8.2 117.37.50.159 159.211.197.8 208.145.2.81