Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Istanbul

Region: Istanbul

Country: Turkey

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.20.149.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57531
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.20.149.39.			IN	A

;; AUTHORITY SECTION:
.			433	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022071002 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jul 11 06:42:49 CST 2022
;; MSG SIZE  rcvd: 104
Host info
39.149.20.2.in-addr.arpa domain name pointer a2-20-149-39.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
39.149.20.2.in-addr.arpa	name = a2-20-149-39.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
83.159.194.187 attack
Mar 26 00:29:39 pkdns2 sshd\[18245\]: Invalid user ricci from 83.159.194.187Mar 26 00:29:41 pkdns2 sshd\[18245\]: Failed password for invalid user ricci from 83.159.194.187 port 48708 ssh2Mar 26 00:31:44 pkdns2 sshd\[18362\]: Invalid user arul from 83.159.194.187Mar 26 00:31:46 pkdns2 sshd\[18362\]: Failed password for invalid user arul from 83.159.194.187 port 40347 ssh2Mar 26 00:33:46 pkdns2 sshd\[18450\]: Invalid user cdsmgr from 83.159.194.187Mar 26 00:33:49 pkdns2 sshd\[18450\]: Failed password for invalid user cdsmgr from 83.159.194.187 port 60219 ssh2
...
2020-03-26 07:42:32
119.29.107.55 attackspambots
Brute force SMTP login attempted.
...
2020-03-26 08:08:35
95.78.251.116 attack
Invalid user kamal from 95.78.251.116 port 48960
2020-03-26 07:50:34
60.210.40.210 attack
Invalid user guest4 from 60.210.40.210 port 2120
2020-03-26 07:44:37
138.68.81.162 attack
web-1 [ssh] SSH Attack
2020-03-26 07:46:15
106.12.156.160 attack
SSH Invalid Login
2020-03-26 07:36:25
92.63.194.22 attack
Mar 25 **REMOVED** sshd\[8835\]: Invalid user admin from 92.63.194.22
Mar 25 **REMOVED** sshd\[8848\]: Invalid user Admin from 92.63.194.22
Mar 26 **REMOVED** sshd\[16374\]: Invalid user admin from 92.63.194.22
2020-03-26 07:58:47
94.232.124.40 attackbotsspam
Mar 25 22:21:55 server770 sshd[16649]: Invalid user belea from 94.232.124.40 port 39591
Mar 25 22:21:55 server770 sshd[16649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.232.124.40
Mar 25 22:21:57 server770 sshd[16649]: Failed password for invalid user belea from 94.232.124.40 port 39591 ssh2
Mar 25 22:21:57 server770 sshd[16649]: Received disconnect from 94.232.124.40 port 39591:11: Bye Bye [preauth]
Mar 25 22:21:57 server770 sshd[16649]: Disconnected from 94.232.124.40 port 39591 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=94.232.124.40
2020-03-26 08:05:00
176.31.105.192 attack
Unauthorized connection attempt detected from IP address 176.31.105.192 to port 8090
2020-03-26 07:52:28
106.12.186.74 attackspam
Invalid user runner from 106.12.186.74 port 60658
2020-03-26 08:08:49
69.194.11.7 attack
DATE:2020-03-26 00:05:54, IP:69.194.11.7, PORT:ssh SSH brute force auth (docker-dc)
2020-03-26 07:59:08
213.230.67.32 attackspam
$f2bV_matches
2020-03-26 08:11:15
82.53.28.140 attackbots
20/3/25@17:42:43: FAIL: Alarm-Network address from=82.53.28.140
20/3/25@17:42:43: FAIL: Alarm-Network address from=82.53.28.140
...
2020-03-26 07:39:33
149.56.15.98 attack
Invalid user ut from 149.56.15.98 port 48805
2020-03-26 08:11:35
103.57.123.1 attackbots
Mar 25 19:31:24 NPSTNNYC01T sshd[31299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.57.123.1
Mar 25 19:31:26 NPSTNNYC01T sshd[31299]: Failed password for invalid user kubota from 103.57.123.1 port 50842 ssh2
Mar 25 19:35:10 NPSTNNYC01T sshd[31528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.57.123.1
...
2020-03-26 07:37:48

Recently Reported IPs

2.207.58.3 2.20.9.235 95.181.150.244 183.208.17.1
45.159.23.138 140.186.65.236 203.243.17.120 45.67.212.155
212.119.41.128 85.209.149.11 91.188.246.111 191.96.84.240
178.159.107.78 213.166.77.187 109.236.52.142 154.201.45.204
2.57.219.2 175.226.124.208 154.201.40.51 185.88.101.39