Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: New York

Region: New York

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: New York Connect

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.139.145.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58984
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;216.139.145.71.			IN	A

;; AUTHORITY SECTION:
.			2412	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061200 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jun 13 00:23:05 CST 2019
;; MSG SIZE  rcvd: 118

Host info
Host 71.145.139.216.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 71.145.139.216.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
173.252.87.32 attackbots
[Sun Apr 12 10:50:32.499792 2020] [:error] [pid 3167:tid 140295004800768] [client 173.252.87.32:35446] [client 173.252.87.32] ModSecurity: Access denied with code 403 (phase 2). Match of "eq 0" against "&REQUEST_HEADERS:Transfer-Encoding" required. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "202"] [id "920171"] [msg "GET or HEAD Request with Transfer-Encoding."] [data "1"] [severity "CRITICAL"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/INVALID_HREQ"] [tag "CAPEC-272"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/favicon-96-96.png"] [unique_id "XpKQCMjT@mkMYHPYnhPyWwAAAAE"]
...
2020-04-12 17:57:44
117.26.221.194 attackbots
Apr 12 07:56:59 our-server-hostname postfix/smtpd[19160]: connect from unknown[117.26.221.194]
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr 12 07:57:05 our-server-hostname postfix/smtpd[19160]: disconnect from unknown[117.26.221.194]
Apr 12 14:55:26 our-server-hostname postfix/smtpd[13158]: connect from unknown[117.26.221.194]
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=117.26.221.194
2020-04-12 17:55:39
24.37.198.220 attackspam
Automatic report - Port Scan Attack
2020-04-12 17:46:25
134.122.76.222 attack
2020-04-12T10:17:37.044914v22018076590370373 sshd[6024]: Failed password for invalid user redindy from 134.122.76.222 port 53190 ssh2
2020-04-12T10:20:28.294228v22018076590370373 sshd[10827]: Invalid user yumi from 134.122.76.222 port 38510
2020-04-12T10:20:28.300162v22018076590370373 sshd[10827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.76.222
2020-04-12T10:20:28.294228v22018076590370373 sshd[10827]: Invalid user yumi from 134.122.76.222 port 38510
2020-04-12T10:20:30.214282v22018076590370373 sshd[10827]: Failed password for invalid user yumi from 134.122.76.222 port 38510 ssh2
...
2020-04-12 17:39:46
220.164.2.119 attackbotsspam
CMS (WordPress or Joomla) login attempt.
2020-04-12 17:54:09
76.71.37.147 attackspam
20/4/12@05:24:42: FAIL: Alarm-Telnet address from=76.71.37.147
...
2020-04-12 18:02:58
42.117.162.173 attack
[portscan] Port scan
2020-04-12 17:43:06
207.99.102.202 attackspambots
firewall-block, port(s): 23/tcp
2020-04-12 18:10:14
185.36.81.57 attackbotsspam
(smtpauth) Failed SMTP AUTH login from 185.36.81.57 (LT/Republic of Lithuania/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SMTPAUTH; Logs: 2020-04-12 11:11:46 login authenticator failed for (User) [185.36.81.57]: 535 Incorrect authentication data (set_id=jared)
2020-04-12 11:11:48 login authenticator failed for (User) [185.36.81.57]: 535 Incorrect authentication data (set_id=jared)
2020-04-12 11:35:17 login authenticator failed for (User) [185.36.81.57]: 535 Incorrect authentication data (set_id=harvard)
2020-04-12 11:35:19 login authenticator failed for (User) [185.36.81.57]: 535 Incorrect authentication data (set_id=harvard)
2020-04-12 11:58:49 login authenticator failed for (User) [185.36.81.57]: 535 Incorrect authentication data (set_id=cgfhnfr)
2020-04-12 18:03:59
173.252.87.50 attack
[Sun Apr 12 10:50:15.752591 2020] [:error] [pid 3625:tid 140295004800768] [client 173.252.87.50:50506] [client 173.252.87.50] ModSecurity: Access denied with code 403 (phase 2). Match of "eq 0" against "&REQUEST_HEADERS:Transfer-Encoding" required. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "202"] [id "920171"] [msg "GET or HEAD Request with Transfer-Encoding."] [data "1"] [severity "CRITICAL"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/INVALID_HREQ"] [tag "CAPEC-272"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/disquss-v1.js"] [unique_id "XpKP96LL@8cf6BWsPUlIaAAAAAE"]
...
2020-04-12 18:04:21
50.227.195.3 attackbots
Apr 12 10:59:05 host01 sshd[25999]: Failed password for root from 50.227.195.3 port 52746 ssh2
Apr 12 11:02:48 host01 sshd[26719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.227.195.3 
Apr 12 11:02:49 host01 sshd[26719]: Failed password for invalid user home from 50.227.195.3 port 60048 ssh2
...
2020-04-12 17:41:54
173.252.87.45 attackbots
[Sun Apr 12 10:50:14.537271 2020] [:error] [pid 3610:tid 140294988015360] [client 173.252.87.45:34642] [client 173.252.87.45] ModSecurity: Access denied with code 403 (phase 2). Match of "eq 0" against "&REQUEST_HEADERS:Transfer-Encoding" required. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "202"] [id "920171"] [msg "GET or HEAD Request with Transfer-Encoding."] [data "1"] [severity "CRITICAL"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/INVALID_HREQ"] [tag "CAPEC-272"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/TableFilter/system-v98.css"] [unique_id "XpKP9seJ7QLCrtS-d9zLuQAAAAE"]
...
2020-04-12 18:08:22
109.169.210.153 attackspambots
20/4/12@02:08:56: FAIL: Alarm-Network address from=109.169.210.153
20/4/12@02:08:56: FAIL: Alarm-Network address from=109.169.210.153
...
2020-04-12 17:45:10
45.125.65.35 attack
Apr 12 11:44:59 srv01 postfix/smtpd\[13040\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 12 11:45:20 srv01 postfix/smtpd\[13040\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 12 11:45:27 srv01 postfix/smtpd\[18985\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 12 11:54:08 srv01 postfix/smtpd\[18985\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 12 11:55:23 srv01 postfix/smtpd\[19000\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-04-12 18:07:01
134.209.62.141 attack
20/4/12@04:43:05: FAIL: Alarm-Intrusion address from=134.209.62.141
...
2020-04-12 17:53:06

Recently Reported IPs

89.208.239.216 43.234.148.48 34.66.184.12 103.252.24.187
150.232.187.255 181.93.232.102 91.144.142.125 182.143.168.19
206.49.29.168 37.132.66.235 79.210.42.63 78.181.190.238
178.62.54.43 14.165.164.174 93.146.8.19 132.106.174.105
179.253.232.86 54.67.0.196 17.252.76.24 96.203.95.216