Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.139.214.76
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32676
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.139.214.76.			IN	A

;; AUTHORITY SECTION:
.			378	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 16:27:23 CST 2022
;; MSG SIZE  rcvd: 105
Host info
76.214.139.2.in-addr.arpa domain name pointer 76.red-2-139-214.staticip.rima-tde.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
76.214.139.2.in-addr.arpa	name = 76.red-2-139-214.staticip.rima-tde.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
192.241.239.247 attackspam
 TCP (SYN) 192.241.239.247:43443 -> port 2077, len 44
2020-10-03 05:52:57
104.248.130.10 attack
Oct  2 21:07:17 icinga sshd[17414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.130.10 
Oct  2 21:07:19 icinga sshd[17414]: Failed password for invalid user temp from 104.248.130.10 port 42444 ssh2
Oct  2 21:18:18 icinga sshd[34166]: Failed password for root from 104.248.130.10 port 44596 ssh2
...
2020-10-03 06:05:11
103.133.150.194 attackspambots
Repeated RDP login failures. Last user: Nancy
2020-10-03 05:35:23
200.185.239.47 attackbotsspam
Telnet Honeypot -> Telnet Bruteforce / Login
2020-10-03 05:52:43
88.209.116.204 attackspambots
Repeated RDP login failures. Last user: Sales
2020-10-03 05:36:33
192.241.217.10 attack
 TCP (SYN) 192.241.217.10:34731 -> port 8080, len 40
2020-10-03 06:05:31
69.163.197.8 attackspam
Website hacking attempt: Wordpress admin access [wp-login.php]
2020-10-03 05:54:03
115.48.129.216 attackspam
Listed on    zen-spamhaus also abuseat.org   / proto=6  .  srcport=20807  .  dstport=23 Telnet  .     (3833)
2020-10-03 05:50:54
91.204.248.42 attackspam
SSH Invalid Login
2020-10-03 05:50:16
167.172.61.49 attackbotsspam
Invalid user it from 167.172.61.49 port 41494
2020-10-03 05:39:41
45.237.140.120 attackspam
Invalid user nexus from 45.237.140.120 port 37956
2020-10-03 06:06:25
192.241.221.46 attack
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-03 05:59:43
144.76.6.230 attackspam
20 attempts against mh-misbehave-ban on lake
2020-10-03 05:44:28
80.30.157.252 attackbotsspam
Unauthorized SSH login attempts
2020-10-03 05:52:25
58.246.174.74 attack
SSH Invalid Login
2020-10-03 05:46:46

Recently Reported IPs

2.138.251.195 2.142.180.193 2.147.152.70 2.140.97.21
2.147.135.197 2.142.186.113 2.147.243.141 2.141.122.87
2.147.129.214 2.147.239.144 2.143.156.252 2.147.18.188
2.147.114.69 2.155.114.106 2.155.82.12 2.147.46.23
2.154.228.224 2.155.124.197 2.176.141.48 2.155.46.3