Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: La Barca

Region: Jalisco

Country: Mexico

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 189.195.139.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49374
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;189.195.139.221.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071301 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jul 14 13:10:25 CST 2019
;; MSG SIZE  rcvd: 119
Host info
221.139.195.189.in-addr.arpa domain name pointer customer-PUE-MCA-139-221.megared.net.mx.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
221.139.195.189.in-addr.arpa	name = customer-PUE-MCA-139-221.megared.net.mx.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
156.216.163.123 attackbotsspam
trying to access non-authorized port
2020-03-08 13:23:51
128.65.188.242 attackspambots
Honeypot attack, port: 81, PTR: PTR record not found
2020-03-08 13:30:06
176.31.236.190 attack
trying to access non-authorized port
2020-03-08 13:44:01
1.34.136.2 attackspam
Automatic report - Port Scan Attack
2020-03-08 13:17:20
35.231.219.146 attack
Mar  8 06:00:31 * sshd[11426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.231.219.146
Mar  8 06:00:32 * sshd[11426]: Failed password for invalid user hadoop from 35.231.219.146 port 56868 ssh2
2020-03-08 13:20:10
201.140.108.146 attack
Honeypot attack, port: 445, PTR: 146.201-140-108.bestelclientes.com.mx.
2020-03-08 13:41:59
5.9.154.69 attackspam
20 attempts against mh-misbehave-ban on ice
2020-03-08 13:37:44
120.210.134.49 attackbots
Mar  8 05:58:58 lnxded64 sshd[9849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.210.134.49
2020-03-08 13:27:06
118.89.108.152 attackspambots
Mar  8 10:48:03 gw1 sshd[21353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.108.152
Mar  8 10:48:05 gw1 sshd[21353]: Failed password for invalid user bpadmin from 118.89.108.152 port 45368 ssh2
...
2020-03-08 13:57:38
106.13.37.203 attackspam
Mar  8 06:33:33 ns381471 sshd[31715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.37.203
Mar  8 06:33:35 ns381471 sshd[31715]: Failed password for invalid user nicole from 106.13.37.203 port 49292 ssh2
2020-03-08 13:37:01
186.235.252.242 attackspam
Automatic report - Port Scan Attack
2020-03-08 13:49:28
165.227.125.156 attackspam
Mar  8 11:16:22 areeb-Workstation sshd[8032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.125.156 
Mar  8 11:16:24 areeb-Workstation sshd[8032]: Failed password for invalid user houy from 165.227.125.156 port 38212 ssh2
...
2020-03-08 13:51:03
66.42.56.21 attackspambots
xmlrpc attack
2020-03-08 13:21:40
123.30.246.169 attackbotsspam
20/3/7@23:58:35: FAIL: Alarm-Network address from=123.30.246.169
20/3/7@23:58:35: FAIL: Alarm-Network address from=123.30.246.169
...
2020-03-08 13:45:20
174.106.182.20 attackspam
Honeypot attack, port: 4567, PTR: cpe-174-106-182-20.ec.res.rr.com.
2020-03-08 13:17:47

Recently Reported IPs

39.204.51.30 182.77.58.216 89.255.27.106 146.112.104.4
200.220.201.101 65.158.178.168 177.85.116.242 24.121.202.251
113.203.181.14 45.174.152.174 58.148.250.34 203.255.107.228
94.179.205.28 90.85.174.76 49.229.229.10 49.249.237.226
68.198.85.202 123.97.125.16 54.192.255.222 189.91.3.185