Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 225.81.249.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5832
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;225.81.249.139.			IN	A

;; AUTHORITY SECTION:
.			241	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011001 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 03:54:34 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 139.249.81.225.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.249.81.225.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.124.98.229 attack
Autoban   103.124.98.229 AUTH/CONNECT
2019-11-18 20:28:30
187.189.85.162 attackspambots
Autoban   187.189.85.162 ABORTED AUTH
2019-11-18 20:14:55
177.155.36.220 attackbots
Automatic report - Port Scan Attack
2019-11-18 20:20:35
201.190.98.205 attack
Autoban   201.190.98.205 ABORTED AUTH
2019-11-18 19:59:03
103.197.197.12 attackbots
Autoban   103.197.197.12 AUTH/CONNECT
2019-11-18 19:52:57
163.172.207.104 attack
\[2019-11-18 07:01:44\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-18T07:01:44.709-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="4011972592277524",SessionID="0x7fdf2cc6a468",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/53922",ACLName="no_extension_match"
\[2019-11-18 07:05:33\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-18T07:05:33.592-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="3011972592277524",SessionID="0x7fdf2c616ed8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/62669",ACLName="no_extension_match"
\[2019-11-18 07:09:52\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-18T07:09:52.224-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="2011972592277524",SessionID="0x7fdf2cc6a468",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/60242",ACLNam
2019-11-18 20:16:36
14.245.234.20 attackbots
Automatic report - Port Scan Attack
2019-11-18 20:12:29
187.178.25.80 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-18 20:21:44
5.201.129.43 attackbotsspam
Autoban   5.201.129.43 VIRUS
2019-11-18 20:12:46
8.2.129.63 attackspam
Autoban   8.2.129.63 VIRUS
2019-11-18 20:04:00
63.81.87.141 attackspam
Nov 18 07:25:18  exim[25906]: 2019-11-18 07:25:18 1iWaTM-0006jq-B9 H=fondle.jcnovel.com (fondle.inoxbig.com) [63.81.87.141] F= rejected after DATA: This message scored 101.3 spam points.
2019-11-18 20:27:21
5.192.102.44 attack
Autoban   5.192.102.44 VIRUS
2019-11-18 20:15:58
103.126.109.2 attack
Autoban   103.126.109.2 AUTH/CONNECT
2019-11-18 20:26:59
27.147.222.139 attackspambots
port scan and connect, tcp 80 (http)
2019-11-18 20:13:59
203.101.178.214 attackspam
Autoban   203.101.178.214 ABORTED AUTH
2019-11-18 19:53:14

Recently Reported IPs

72.123.194.21 166.96.21.106 118.219.133.211 125.196.123.138
229.233.56.59 35.225.82.182 150.166.228.202 212.66.56.226
222.30.87.67 165.132.99.50 105.252.207.71 18.184.124.147
116.166.73.216 130.126.19.252 121.226.116.3 3.217.166.123
239.219.250.219 139.221.111.159 172.89.242.196 105.196.122.125