Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Plymouth

Region: England

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: EE Limited

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.24.139.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17307
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.24.139.213.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081301 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Aug 14 04:02:08 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 213.139.24.2.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 213.139.24.2.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
183.129.163.142 attackbots
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-09-10T19:10:02Z and 2020-09-10T19:14:07Z
2020-09-11 08:36:06
88.86.4.124 attackspambots
Automatic report - XMLRPC Attack
2020-09-11 08:37:40
45.129.33.144 attack
ET DROP Dshield Block Listed Source group 1 - port: 42899 proto: tcp cat: Misc Attackbytes: 60
2020-09-11 08:51:26
185.247.224.23 attackspam
185.247.224.23 - - \[10/Sep/2020:23:03:03 +0200\] "GET /index.php\?id=ausland%22%29%2F%2A\&id=%2A%2FAND%2F%2A\&id=%2A%2FEXP%28\~%28SELECT%2F%2A\&id=%2A%2F%2A%2F%2A\&id=%2A%2FFROM%2F%2A\&id=%2A%2F%28SELECT%2F%2A\&id=%2A%2FCONCAT%280x7178716b71\&id=%28SELECT%2F%2A\&id=%2A%2F%28ELT%283724%3D3724\&id=1%29%29%29\&id=0x7162717171\&id=0x78%29%29x%29%29%2F%2A\&id=%2A%2FAND%2F%2A\&id=%2A%2F%28%22FRTX%22%2F%2A\&id=%2A%2FLIKE%2F%2A\&id=%2A%2F%22FRTX HTTP/1.1" 200 12305 "http://www.firma-lsf.eu:80/index.php" "Googlebot \(compatible  Googlebot/2.1   http://www.google.com/bot.html\)"
...
2020-09-11 09:08:07
94.102.53.112 attack
[H1.VM2] Blocked by UFW
2020-09-11 09:12:55
109.70.100.34 attackbots
109.70.100.34 - - \[10/Sep/2020:18:53:56 +0200\] "GET /index.php\?id=ausland%29%2F%2A\&id=%2A%2FAS%2F%2A\&id=%2A%2FEdDk%2F%2A\&id=%2A%2FWHERE%2F%2A\&id=%2A%2F4374%3D4374%2F%2A\&id=%2A%2FAND%2F%2A\&id=%2A%2F5773%3D%28SELECT%2F%2A\&id=%2A%2F%28CASE%2F%2A\&id=%2A%2FWHEN%2F%2A\&id=%2A%2F%285773%3D5773%29%2F%2A\&id=%2A%2FTHEN%2F%2A\&id=%2A%2F5773%2F%2A\&id=%2A%2FELSE%2F%2A\&id=%2A%2F%28SELECT%2F%2A\&id=%2A%2F8460%2F%2A\&id=%2A%2FUNION%2F%2A\&id=%2A%2FSELECT%2F%2A\&id=%2A%2F3396%29%2F%2A\&id=%2A%2FEND%29%29--%2F%2A\&id=%2A%2FKduF HTTP/1.1" 200 12305 "http://www.firma-lsf.eu:80/index.php" "Googlebot \(compatible  Googlebot/2.1   http://www.google.com/bot.html\)"
...
2020-09-11 08:51:04
51.210.96.169 attack
Sep 11 01:07:29 plex-server sshd[561729]: Invalid user Admin123456! from 51.210.96.169 port 56658
Sep 11 01:07:29 plex-server sshd[561729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.210.96.169 
Sep 11 01:07:29 plex-server sshd[561729]: Invalid user Admin123456! from 51.210.96.169 port 56658
Sep 11 01:07:31 plex-server sshd[561729]: Failed password for invalid user Admin123456! from 51.210.96.169 port 56658 ssh2
Sep 11 01:11:13 plex-server sshd[564052]: Invalid user now.cn123 from 51.210.96.169 port 33583
...
2020-09-11 09:17:23
36.77.92.86 attackbotsspam
1599756826 - 09/10/2020 18:53:46 Host: 36.77.92.86/36.77.92.86 Port: 445 TCP Blocked
2020-09-11 08:56:59
125.142.85.137 attack
Sep 10 18:23:34 marvibiene sshd[60916]: Invalid user admin from 125.142.85.137 port 37398
Sep 10 18:23:35 marvibiene sshd[60916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.142.85.137
Sep 10 18:23:34 marvibiene sshd[60916]: Invalid user admin from 125.142.85.137 port 37398
Sep 10 18:23:37 marvibiene sshd[60916]: Failed password for invalid user admin from 125.142.85.137 port 37398 ssh2
2020-09-11 09:04:41
194.147.115.146 attackbotsspam
Brute force attack stopped by firewall
2020-09-11 08:45:28
106.13.190.51 attackspam
Time:     Thu Sep 10 22:04:10 2020 +0000
IP:       106.13.190.51 (CN/China/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 10 21:48:28 ca-48-ede1 sshd[68973]: Invalid user sid from 106.13.190.51 port 43982
Sep 10 21:48:30 ca-48-ede1 sshd[68973]: Failed password for invalid user sid from 106.13.190.51 port 43982 ssh2
Sep 10 22:00:45 ca-48-ede1 sshd[69375]: Invalid user admin from 106.13.190.51 port 36198
Sep 10 22:00:46 ca-48-ede1 sshd[69375]: Failed password for invalid user admin from 106.13.190.51 port 36198 ssh2
Sep 10 22:04:08 ca-48-ede1 sshd[69558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.190.51  user=root
2020-09-11 08:49:56
40.121.163.198 attackspambots
SSH Invalid Login
2020-09-11 09:14:47
195.54.167.91 attackspam
ET DROP Dshield Block Listed Source group 1 - port: 25989 proto: tcp cat: Misc Attackbytes: 60
2020-09-11 09:10:03
194.26.25.122 attackbots
[H1.VM10] Blocked by UFW
2020-09-11 09:10:18
185.220.101.9 attack
(sshd) Failed SSH login from 185.220.101.9 (DE/Germany/-): 10 in the last 3600 secs
2020-09-11 08:39:49

Recently Reported IPs

132.210.51.0 119.74.181.107 188.115.171.248 60.159.49.173
156.192.188.229 149.47.74.49 187.108.190.189 53.25.32.39
5.109.6.217 94.255.172.134 98.93.75.157 188.120.241.106
75.221.151.48 95.227.101.113 100.136.161.214 72.188.233.50
101.154.110.214 34.201.228.243 116.8.146.247 120.213.137.17