Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Türkiye

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 217.131.168.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15174
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;217.131.168.139.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 02:01:50 CST 2025
;; MSG SIZE  rcvd: 108
Host info
139.168.131.217.in-addr.arpa domain name pointer host-217-131-168-139.reverse.superonline.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.168.131.217.in-addr.arpa	name = host-217-131-168-139.reverse.superonline.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.91.250.49 attack
Jul 19 00:17:02 Invalid user moe from 51.91.250.49 port 43868
2020-07-19 06:54:03
120.92.109.69 attack
Invalid user www from 120.92.109.69 port 37182
2020-07-19 06:46:50
180.76.101.202 attackspam
SSH Brute-Force. Ports scanning.
2020-07-19 07:00:15
103.133.105.65 attack
Rude login attack (4 tries in 1d)
2020-07-19 06:50:55
184.105.139.70 attack
Unauthorized connection attempt detected from IP address 184.105.139.70 to port 23
2020-07-19 06:51:16
120.52.139.130 attack
Jul 19 00:10:25 eventyay sshd[11200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.139.130
Jul 19 00:10:26 eventyay sshd[11200]: Failed password for invalid user acs from 120.52.139.130 port 34656 ssh2
Jul 19 00:15:45 eventyay sshd[11365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.139.130
...
2020-07-19 06:28:20
194.26.25.81 attackbotsspam
Multiport scan : 140 ports scanned 8010 8018 8029 8060 8094 8099 8134 8144 8175 8192 8194 8215 8265 8275 8277 8298 8306 8310 8329 8356 8370 8372 8408 8432 8458 8463 8475 8482 8489 8491 8494 8501 8503 8518 8520 8539 8575 8594 8595 8614 8636 8645 8649 8663 8691 8695 8714 8717 8726 8735 8738 8745 8754 8755 8757 8764 8767 8768 8786 8790 8791 8798 8809 8849 8850 8859 8861 8868 8887 8900 8919 8931 9013 9031 9044 9050 9063 9078 9094 9132 .....
2020-07-19 06:48:41
139.59.241.75 attackbots
Invalid user moni from 139.59.241.75 port 56561
2020-07-19 06:58:15
185.220.102.250 attack
Failed password for invalid user from 185.220.102.250 port 2918 ssh2
2020-07-19 06:24:37
222.186.175.148 attackspam
Fail2Ban Ban Triggered (2)
2020-07-19 06:23:45
117.51.141.241 attack
Invalid user admin from 117.51.141.241 port 40376
2020-07-19 06:36:42
79.35.97.45 attackbotsspam
Automatic report - Port Scan Attack
2020-07-19 06:35:57
54.249.221.80 attackbotsspam
$f2bV_matches
2020-07-19 06:51:40
156.204.86.140 attack
1595101772 - 07/18/2020 21:49:32 Host: 156.204.86.140/156.204.86.140 Port: 445 TCP Blocked
2020-07-19 06:31:40
138.68.40.92 attackspam
firewall-block, port(s): 8138/tcp
2020-07-19 06:43:56

Recently Reported IPs

22.85.70.146 74.35.44.51 157.148.125.16 149.28.88.181
143.250.49.63 118.45.169.112 221.206.203.138 21.186.197.184
79.244.64.208 81.206.82.172 201.131.241.254 149.120.193.17
121.31.106.106 248.181.96.96 116.157.135.239 21.42.3.77
235.14.0.119 154.38.24.64 230.138.254.20 39.54.153.84