Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Mexico

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 189.219.48.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20483
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;189.219.48.139.			IN	A

;; AUTHORITY SECTION:
.			484	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020601 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 12:36:47 CST 2022
;; MSG SIZE  rcvd: 107
Host info
139.48.219.189.in-addr.arpa domain name pointer 189.219.48.139-clientes-izzi.mx.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.48.219.189.in-addr.arpa	name = 189.219.48.139-clientes-izzi.mx.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
149.202.59.85 attackspam
Sep 23 23:02:48 mail sshd\[23680\]: Failed password for invalid user tcsh from 149.202.59.85 port 35994 ssh2
Sep 23 23:06:47 mail sshd\[24200\]: Invalid user ftpuser from 149.202.59.85 port 56520
Sep 23 23:06:47 mail sshd\[24200\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.59.85
Sep 23 23:06:50 mail sshd\[24200\]: Failed password for invalid user ftpuser from 149.202.59.85 port 56520 ssh2
Sep 23 23:10:50 mail sshd\[24694\]: Invalid user qc from 149.202.59.85 port 48812
Sep 23 23:10:50 mail sshd\[24694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.59.85
2019-09-24 05:24:34
212.174.243.54 attackspambots
Unauthorized connection attempt from IP address 212.174.243.54 on Port 445(SMB)
2019-09-24 05:07:22
122.4.48.140 attackbotsspam
Port Scan: TCP/443
2019-09-24 04:50:03
140.143.236.227 attackspambots
Sep 23 21:20:35 Ubuntu-1404-trusty-64-minimal sshd\[20048\]: Invalid user ftp_test from 140.143.236.227
Sep 23 21:20:35 Ubuntu-1404-trusty-64-minimal sshd\[20048\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.236.227
Sep 23 21:20:37 Ubuntu-1404-trusty-64-minimal sshd\[20048\]: Failed password for invalid user ftp_test from 140.143.236.227 port 40624 ssh2
Sep 23 21:55:08 Ubuntu-1404-trusty-64-minimal sshd\[15186\]: Invalid user uucpadm from 140.143.236.227
Sep 23 21:55:08 Ubuntu-1404-trusty-64-minimal sshd\[15186\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.236.227
2019-09-24 05:04:34
178.19.247.25 attackspambots
proto=tcp  .  spt=34524  .  dpt=25  .     (listed on   dnsbl-sorbs plus abuseat-org and barracuda)     (530)
2019-09-24 05:14:13
71.40.80.50 attackspambots
Unauthorized connection attempt from IP address 71.40.80.50 on Port 445(SMB)
2019-09-24 05:01:42
222.186.42.163 attackspambots
2019-09-23T21:18:37.926927abusebot-7.cloudsearch.cf sshd\[32306\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.163  user=root
2019-09-24 05:18:52
36.232.182.141 attack
Telnet Server BruteForce Attack
2019-09-24 04:52:16
104.143.37.43 attack
Sep 23 15:24:05 hcbbdb sshd\[13243\]: Invalid user rails from 104.143.37.43
Sep 23 15:24:05 hcbbdb sshd\[13243\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.143.37.43
Sep 23 15:24:06 hcbbdb sshd\[13243\]: Failed password for invalid user rails from 104.143.37.43 port 50554 ssh2
Sep 23 15:29:05 hcbbdb sshd\[13827\]: Invalid user musikbot from 104.143.37.43
Sep 23 15:29:05 hcbbdb sshd\[13827\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.143.37.43
2019-09-24 04:50:50
106.51.73.204 attack
Sep 23 19:38:02 lnxded63 sshd[9535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.73.204
2019-09-24 04:52:52
104.140.210.22 attack
104.140.210.22 - - [23/Sep/2019:08:16:12 -0400] "GET /?page=products&action=..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd&manufacturerID=1&productID=6501.15M&linkID=3128 HTTP/1.1" 200 17212 "https://baldwinbrasshardware.com/?page=products&action=..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd&manufacturerID=1&productID=6501.15M&linkID=3128" "Mozilla/5.0 (Windows NT 10.0; WOW64; Rv:50.0) Gecko/20100101 Firefox/50.0"
...
2019-09-24 05:14:48
192.12.112.102 attack
2019-09-23T20:53:28.123524abusebot-5.cloudsearch.cf sshd\[2122\]: Invalid user ubuntu from 192.12.112.102 port 37860
2019-09-24 04:58:32
222.186.175.183 attackspam
Sep 23 23:17:07 legacy sshd[3488]: Failed password for root from 222.186.175.183 port 56708 ssh2
Sep 23 23:17:24 legacy sshd[3488]: error: maximum authentication attempts exceeded for root from 222.186.175.183 port 56708 ssh2 [preauth]
Sep 23 23:17:34 legacy sshd[3499]: Failed password for root from 222.186.175.183 port 58202 ssh2
...
2019-09-24 05:18:24
167.99.38.73 attack
Sep 24 00:08:08 server sshd\[915\]: Invalid user qwerty12 from 167.99.38.73 port 36250
Sep 24 00:08:08 server sshd\[915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.38.73
Sep 24 00:08:10 server sshd\[915\]: Failed password for invalid user qwerty12 from 167.99.38.73 port 36250 ssh2
Sep 24 00:12:03 server sshd\[26843\]: Invalid user engineering from 167.99.38.73 port 48180
Sep 24 00:12:03 server sshd\[26843\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.38.73
2019-09-24 05:18:10
134.73.76.14 attackbotsspam
Postfix RBL failed
2019-09-24 05:28:31

Recently Reported IPs

109.62.213.169 5.59.24.81 178.154.204.1 81.12.98.55
65.181.85.218 211.247.70.95 39.148.16.122 154.117.159.226
13.52.179.209 116.21.87.55 122.165.180.237 94.182.2.179
223.149.49.243 201.218.201.218 114.45.76.79 219.85.234.54
85.202.168.83 121.151.88.118 191.242.210.110 123.9.239.224