Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.139.31.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39724
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.139.31.20.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 15:23:32 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 20.31.139.21.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 20.31.139.21.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
157.230.133.15 attackbotsspam
Oct 27 10:35:55 server sshd\[944\]: Invalid user minecraft from 157.230.133.15
Oct 27 10:35:55 server sshd\[944\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.133.15 
Oct 27 10:35:57 server sshd\[944\]: Failed password for invalid user minecraft from 157.230.133.15 port 37050 ssh2
Oct 27 10:40:00 server sshd\[2146\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.133.15  user=root
Oct 27 10:40:02 server sshd\[2146\]: Failed password for root from 157.230.133.15 port 50748 ssh2
...
2019-10-27 16:53:14
139.59.107.152 attackspambots
Port Scan: TCP/443
2019-10-27 16:53:45
178.46.209.36 attack
Unauthorised access (Oct 27) SRC=178.46.209.36 LEN=40 TTL=51 ID=39092 TCP DPT=23 WINDOW=44316 SYN
2019-10-27 16:56:26
207.154.206.212 attack
Oct 27 06:07:03 web8 sshd\[4373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.206.212  user=root
Oct 27 06:07:05 web8 sshd\[4373\]: Failed password for root from 207.154.206.212 port 34070 ssh2
Oct 27 06:11:04 web8 sshd\[6239\]: Invalid user bp from 207.154.206.212
Oct 27 06:11:04 web8 sshd\[6239\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.206.212
Oct 27 06:11:07 web8 sshd\[6239\]: Failed password for invalid user bp from 207.154.206.212 port 44102 ssh2
2019-10-27 16:17:32
202.83.43.133 attack
PHI,WP GET /wp-login.php
2019-10-27 16:39:44
178.128.55.52 attackspambots
2019-10-27T08:44:22.887321abusebot-5.cloudsearch.cf sshd\[31029\]: Invalid user robert from 178.128.55.52 port 48219
2019-10-27 16:54:17
117.121.214.50 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/117.121.214.50/ 
 
 TH - 1H : (20)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TH 
 NAME ASN : ASN38794 
 
 IP : 117.121.214.50 
 
 CIDR : 117.121.214.0/24 
 
 PREFIX COUNT : 167 
 
 UNIQUE IP COUNT : 67840 
 
 
 ATTACKS DETECTED ASN38794 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-10-27 06:26:38 
 
 INFO : Port SSH 22 Scan Detected and Blocked by ADMIN  - data recovery
2019-10-27 16:13:37
167.114.24.184 attackbotsspam
firewall-block, port(s): 5984/tcp
2019-10-27 16:56:53
200.149.1.106 attackbotsspam
(From webuydomains@bigwidewebpro.com) Dear owner for bafilefamilychiro.com,

We came across your site and wanted to see are you considering selling your domain and website?

If you have considered it could you let us know by going to bigwidewebpro.com for additional info on what we would like to buy.

We would just have a few questions to help us make a proper offer for your site, look forward to hearing!

Thanks
James Harrison
bigwidewebpro.com
2019-10-27 16:33:05
109.194.199.28 attack
Oct 27 03:50:42 *** sshd[3717]: User root from 109.194.199.28 not allowed because not listed in AllowUsers
2019-10-27 16:34:38
156.197.99.51 attackbots
Oct 27 04:51:02 vmd38886 sshd\[28980\]: Invalid user admin from 156.197.99.51 port 43444
Oct 27 04:51:02 vmd38886 sshd\[28980\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.197.99.51
Oct 27 04:51:04 vmd38886 sshd\[28980\]: Failed password for invalid user admin from 156.197.99.51 port 43444 ssh2
2019-10-27 16:21:32
156.208.17.6 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/156.208.17.6/ 
 
 EG - 1H : (31)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : EG 
 NAME ASN : ASN8452 
 
 IP : 156.208.17.6 
 
 CIDR : 156.208.0.0/18 
 
 PREFIX COUNT : 833 
 
 UNIQUE IP COUNT : 7610368 
 
 
 ATTACKS DETECTED ASN8452 :  
  1H - 12 
  3H - 23 
  6H - 23 
 12H - 27 
 24H - 27 
 
 DateTime : 2019-10-27 04:50:32 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-27 16:38:06
109.170.1.58 attack
Invalid user shop from 109.170.1.58 port 40820
2019-10-27 16:40:11
159.65.144.233 attack
Oct 27 07:51:46 *** sshd[15426]: Invalid user usuario from 159.65.144.233
2019-10-27 16:16:56
177.130.55.126 attack
(From webuydomains@bigwidewebpro.com) Dear owner for bafilefamilychiro.com,

We came across your site and wanted to see are you considering selling your domain and website?

If you have considered it could you let us know by going to bigwidewebpro.com for additional info on what we would like to buy.

We would just have a few questions to help us make a proper offer for your site, look forward to hearing!

Thanks
James Harrison
bigwidewebpro.com
2019-10-27 16:31:25

Recently Reported IPs

138.118.161.234 90.254.70.163 249.88.83.215 46.99.39.35
77.115.54.184 119.61.85.0 192.47.71.17 96.220.66.152
140.172.124.104 224.29.40.21 40.255.210.116 94.55.202.34
204.91.48.37 135.140.79.8 133.151.111.150 74.79.119.63
63.54.210.235 151.148.114.204 186.90.24.26 251.250.21.161