Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Canberra

Region: Australian Capital Territory

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 172.195.139.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23157
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;172.195.139.49.			IN	A

;; AUTHORITY SECTION:
.			508	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020090202 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 03 07:49:49 CST 2020
;; MSG SIZE  rcvd: 118
Host info
49.139.195.172.in-addr.arpa domain name pointer cpe-172-195-139-49.nsw.foxtel.net.au.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
49.139.195.172.in-addr.arpa	name = cpe-172-195-139-49.nsw.foxtel.net.au.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
110.227.102.208 attackspam
Unauthorized connection attempt from IP address 110.227.102.208 on Port 445(SMB)
2020-08-18 02:35:03
193.228.108.122 attackbotsspam
2020-08-17T20:05:26.809905n23.at sshd[1155667]: Invalid user cal from 193.228.108.122 port 33954
2020-08-17T20:05:29.074100n23.at sshd[1155667]: Failed password for invalid user cal from 193.228.108.122 port 33954 ssh2
2020-08-17T20:20:56.304320n23.at sshd[1168759]: Invalid user kamiya from 193.228.108.122 port 43334
...
2020-08-18 02:44:40
61.230.42.39 attack
Unauthorized connection attempt from IP address 61.230.42.39 on Port 445(SMB)
2020-08-18 02:30:00
49.149.111.254 attack
Unauthorized connection attempt from IP address 49.149.111.254 on Port 445(SMB)
2020-08-18 02:45:27
94.99.248.250 attackbots
Email rejected due to spam filtering
2020-08-18 02:28:26
154.72.192.26 attackbotsspam
Aug 17 19:43:43 root sshd[2035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.72.192.26 
Aug 17 19:43:45 root sshd[2035]: Failed password for invalid user git from 154.72.192.26 port 20578 ssh2
Aug 17 20:00:24 root sshd[4325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.72.192.26 
...
2020-08-18 02:47:34
138.68.73.20 attack
Fail2Ban
2020-08-18 02:50:17
117.247.238.10 attackbots
2020-08-17T13:11:48.444563morrigan.ad5gb.com sshd[1239771]: Invalid user pradeep from 117.247.238.10 port 33166
2020-08-17T13:11:50.487355morrigan.ad5gb.com sshd[1239771]: Failed password for invalid user pradeep from 117.247.238.10 port 33166 ssh2
2020-08-18 02:38:48
114.161.176.220 attack
Unauthorized connection attempt from IP address 114.161.176.220 on Port 445(SMB)
2020-08-18 02:39:16
168.138.221.133 attackbotsspam
Aug 17 20:25:33 ip106 sshd[26438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.138.221.133 
Aug 17 20:25:35 ip106 sshd[26438]: Failed password for invalid user user from 168.138.221.133 port 56280 ssh2
...
2020-08-18 02:34:01
51.91.123.119 attackbotsspam
$f2bV_matches
2020-08-18 02:51:12
96.83.189.229 attack
Aug 17 14:54:47 pkdns2 sshd\[24755\]: Invalid user yjq from 96.83.189.229Aug 17 14:54:48 pkdns2 sshd\[24755\]: Failed password for invalid user yjq from 96.83.189.229 port 37240 ssh2Aug 17 14:58:07 pkdns2 sshd\[24931\]: Invalid user oracle from 96.83.189.229Aug 17 14:58:09 pkdns2 sshd\[24931\]: Failed password for invalid user oracle from 96.83.189.229 port 34080 ssh2Aug 17 15:01:30 pkdns2 sshd\[25090\]: Invalid user airadmin from 96.83.189.229Aug 17 15:01:31 pkdns2 sshd\[25090\]: Failed password for invalid user airadmin from 96.83.189.229 port 59148 ssh2
...
2020-08-18 02:37:20
192.99.34.142 attack
192.99.34.142 - - [17/Aug/2020:19:10:41 +0100] "POST /wp-login.php HTTP/1.1" 200 5575 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
192.99.34.142 - - [17/Aug/2020:19:12:59 +0100] "POST /wp-login.php HTTP/1.1" 200 5575 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
192.99.34.142 - - [17/Aug/2020:19:15:39 +0100] "POST /wp-login.php HTTP/1.1" 200 5575 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
...
2020-08-18 02:24:53
117.50.107.175 attack
Aug 17 13:01:44 l03 sshd[8243]: Invalid user rebeca from 117.50.107.175 port 38852
...
2020-08-18 02:24:04
176.31.163.192 attackbotsspam
fail2ban/Aug 17 19:55:08 h1962932 sshd[4066]: Invalid user wp from 176.31.163.192 port 53326
Aug 17 19:55:08 h1962932 sshd[4066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=vps-971b0d92.vps.ovh.net
Aug 17 19:55:08 h1962932 sshd[4066]: Invalid user wp from 176.31.163.192 port 53326
Aug 17 19:55:10 h1962932 sshd[4066]: Failed password for invalid user wp from 176.31.163.192 port 53326 ssh2
Aug 17 20:01:54 h1962932 sshd[4331]: Invalid user solr from 176.31.163.192 port 39860
2020-08-18 02:17:29

Recently Reported IPs

70.154.46.112 118.246.184.63 151.47.102.6 41.50.25.11
197.50.153.241 25.18.9.201 64.147.196.35 43.182.124.250
245.127.240.152 211.202.188.57 249.106.34.138 77.9.227.180
35.27.222.191 20.185.246.122 225.105.211.81 31.247.61.210
189.219.44.205 177.147.239.251 13.84.178.241 190.184.201.99