Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 170.81.52.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65206
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;170.81.52.139.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 12:17:06 CST 2025
;; MSG SIZE  rcvd: 106
Host info
139.52.81.170.in-addr.arpa domain name pointer ptr-170-81-52-139.static.lewtelnet-access.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.52.81.170.in-addr.arpa	name = ptr-170-81-52-139.static.lewtelnet-access.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
62.148.142.202 attackbotsspam
Invalid user rpm from 62.148.142.202 port 49218
2019-12-24 21:45:39
37.130.119.63 attackbotsspam
Unauthorised access (Dec 24) SRC=37.130.119.63 LEN=44 TTL=47 ID=2198 TCP DPT=23 WINDOW=47753 SYN
2019-12-24 21:39:40
180.254.2.198 attack
1577171652 - 12/24/2019 08:14:12 Host: 180.254.2.198/180.254.2.198 Port: 445 TCP Blocked
2019-12-24 21:38:46
49.204.46.146 attackbotsspam
Unauthorized connection attempt from IP address 49.204.46.146 on Port 445(SMB)
2019-12-24 22:01:57
213.32.91.37 attackspam
Dec 24 14:42:52 localhost sshd\[18813\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.91.37  user=daemon
Dec 24 14:42:54 localhost sshd\[18813\]: Failed password for daemon from 213.32.91.37 port 56976 ssh2
Dec 24 14:45:25 localhost sshd\[19194\]: Invalid user thanhhoa from 213.32.91.37 port 54424
Dec 24 14:45:25 localhost sshd\[19194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.91.37
2019-12-24 21:51:14
119.29.65.240 attack
SSH invalid-user multiple login attempts
2019-12-24 21:58:45
194.36.174.20 attack
port scan and connect, tcp 1433 (ms-sql-s)
2019-12-24 22:16:54
134.175.54.130 attack
Dec 24 11:02:45 lnxweb61 sshd[26674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.54.130
2019-12-24 22:17:21
106.13.125.159 attackspambots
Invalid user ptodd from 106.13.125.159 port 43912
2019-12-24 22:08:46
54.36.148.8 attackspam
Automatic report - Banned IP Access
2019-12-24 21:46:43
110.139.207.18 attackbotsspam
Invalid user peh from 110.139.207.18 port 34986
2019-12-24 22:06:17
54.39.145.59 attack
Invalid user bergholt from 54.39.145.59 port 41864
2019-12-24 21:43:46
184.105.247.215 attackbotsspam
Scanning random ports - tries to find possible vulnerable services
2019-12-24 21:46:29
123.234.215.242 attackbots
$f2bV_matches
2019-12-24 22:17:40
218.92.0.138 attack
2019-12-24T13:57:45.938822abusebot-2.cloudsearch.cf sshd[21775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.138  user=root
2019-12-24T13:57:47.368288abusebot-2.cloudsearch.cf sshd[21775]: Failed password for root from 218.92.0.138 port 47599 ssh2
2019-12-24T13:57:50.747012abusebot-2.cloudsearch.cf sshd[21775]: Failed password for root from 218.92.0.138 port 47599 ssh2
2019-12-24T13:57:45.938822abusebot-2.cloudsearch.cf sshd[21775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.138  user=root
2019-12-24T13:57:47.368288abusebot-2.cloudsearch.cf sshd[21775]: Failed password for root from 218.92.0.138 port 47599 ssh2
2019-12-24T13:57:50.747012abusebot-2.cloudsearch.cf sshd[21775]: Failed password for root from 218.92.0.138 port 47599 ssh2
2019-12-24T13:57:45.938822abusebot-2.cloudsearch.cf sshd[21775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rho
...
2019-12-24 22:08:03

Recently Reported IPs

223.61.125.174 32.137.32.224 207.127.150.164 226.250.158.52
210.215.15.111 233.228.59.253 153.24.105.216 67.214.200.92
83.163.106.142 25.182.145.208 162.226.116.37 19.238.234.217
132.152.119.53 44.33.180.195 216.219.74.20 18.108.67.237
91.17.83.113 41.199.92.99 69.253.168.5 60.149.141.165