Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Jordan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
213.139.52.65 attack
Brute force attack against VPN service
2020-04-02 07:00:42
213.139.52.7 attack
Autoban   213.139.52.7 AUTH/CONNECT
2019-06-21 19:39:30
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.139.52.198
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50598
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.139.52.198.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 90 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 07:52:05 CST 2022
;; MSG SIZE  rcvd: 107
Host info
198.52.139.213.in-addr.arpa domain name pointer 213.139.x.198.go.com.jo.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
198.52.139.213.in-addr.arpa	name = 213.139.x.198.go.com.jo.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
137.74.166.77 attack
Invalid user nn from 137.74.166.77 port 50306
2020-03-21 22:05:38
121.168.115.36 attackspambots
Invalid user ot from 121.168.115.36 port 56732
2020-03-21 22:08:41
51.91.250.49 attack
Mar 21 09:21:25 reverseproxy sshd[35753]: Failed password for mysql from 51.91.250.49 port 33022 ssh2
Mar 21 09:23:32 reverseproxy sshd[35802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.250.49
2020-03-21 21:33:50
221.122.67.66 attackbotsspam
Invalid user tester from 221.122.67.66 port 59478
2020-03-21 21:44:57
89.248.172.101 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 79 - port: 4713 proto: TCP cat: Misc Attack
2020-03-21 21:32:05
34.92.40.151 attackbots
Mar 21 14:17:33 ns381471 sshd[6460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.92.40.151
Mar 21 14:17:35 ns381471 sshd[6460]: Failed password for invalid user rom from 34.92.40.151 port 49580 ssh2
2020-03-21 21:30:08
149.202.45.205 attack
Invalid user informix from 149.202.45.205 port 39250
2020-03-21 22:02:43
106.52.102.190 attackbotsspam
$f2bV_matches
2020-03-21 22:15:22
159.65.172.240 attackbots
Invalid user hy from 159.65.172.240 port 60642
2020-03-21 22:00:11
193.112.4.12 attackspam
Invalid user upload from 193.112.4.12 port 37332
2020-03-21 21:51:23
148.70.183.250 attackbotsspam
Invalid user faridah from 148.70.183.250 port 34738
2020-03-21 22:03:04
175.30.204.124 attackspam
Invalid user impala from 175.30.204.124 port 49295
2020-03-21 21:57:10
40.117.59.195 attack
Mar 21 14:02:37 * sshd[18314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.117.59.195
Mar 21 14:02:39 * sshd[18314]: Failed password for invalid user prunella from 40.117.59.195 port 40990 ssh2
2020-03-21 21:43:33
139.199.122.210 attack
Invalid user sdtdserver from 139.199.122.210 port 38980
2020-03-21 22:05:08
218.75.210.46 attackbots
Brute force attempt
2020-03-21 21:45:26

Recently Reported IPs

92.178.174.247 82.157.27.30 119.53.172.28 177.249.42.200
172.81.61.111 91.63.125.17 89.17.63.7 201.141.26.234
45.41.241.171 89.169.1.212 112.133.215.24 200.236.123.38
185.152.46.43 58.61.240.127 158.51.126.27 110.182.202.54
122.235.86.86 156.219.113.122 5.127.29.19 180.162.58.236