Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.139.239.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29992
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;18.139.239.42.			IN	A

;; AUTHORITY SECTION:
.			192	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 77 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 18:47:07 CST 2022
;; MSG SIZE  rcvd: 106
Host info
42.239.139.18.in-addr.arpa domain name pointer ec2-18-139-239-42.ap-southeast-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.239.139.18.in-addr.arpa	name = ec2-18-139-239-42.ap-southeast-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
79.161.218.122 attack
Oct 17 03:51:38 hanapaa sshd\[26183\]: Invalid user @dm1ng from 79.161.218.122
Oct 17 03:51:38 hanapaa sshd\[26183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.adsign.no
Oct 17 03:51:40 hanapaa sshd\[26183\]: Failed password for invalid user @dm1ng from 79.161.218.122 port 41514 ssh2
Oct 17 03:56:06 hanapaa sshd\[26522\]: Invalid user qqwwee12345 from 79.161.218.122
Oct 17 03:56:06 hanapaa sshd\[26522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.adsign.no
2019-10-18 00:54:55
91.172.34.34 attackbotsspam
Automatic report - Port Scan Attack
2019-10-18 01:03:24
139.155.1.252 attackspambots
SSH Brute-Forcing (ownc)
2019-10-18 00:52:25
138.204.79.52 attackspam
Spam
2019-10-18 01:14:00
198.108.67.103 attackbotsspam
10/17/2019-12:21:58.918168 198.108.67.103 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-18 01:20:53
198.108.67.53 attackbots
firewall-block, port(s): 9199/tcp
2019-10-18 01:31:34
91.134.240.73 attackbotsspam
$f2bV_matches_ltvn
2019-10-18 01:16:15
196.52.43.55 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-18 01:15:20
198.108.67.102 attackbotsspam
10/17/2019-13:02:15.296873 198.108.67.102 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-18 01:18:14
192.115.165.4 attackbotsspam
" "
2019-10-18 00:57:41
200.61.187.49 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/200.61.187.49/ 
 AR - 1H : (57)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : AR 
 NAME ASN : ASN16814 
 
 IP : 200.61.187.49 
 
 CIDR : 200.61.186.0/23 
 
 PREFIX COUNT : 187 
 
 UNIQUE IP COUNT : 158976 
 
 
 WYKRYTE ATAKI Z ASN16814 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-10-17 13:38:12 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-10-18 01:22:45
83.175.75.224 attack
Spam
2019-10-18 01:05:19
195.66.65.183 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-18 01:12:20
66.252.125.98 attack
Spam
2019-10-18 01:06:29
46.173.214.7 attackspam
Spam
2019-10-18 01:07:09

Recently Reported IPs

18.139.166.9 18.139.241.201 18.139.246.26 18.139.192.129
18.139.31.226 18.139.50.61 18.139.26.223 18.139.34.205
18.139.39.248 18.139.37.132 18.139.52.114 18.139.69.232
18.139.59.113 18.139.34.27 18.139.7.38 192.46.239.236
18.139.46.205 18.139.97.203 18.139.78.155 18.139.87.241