Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Multicast Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 239.113.12.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52345
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;239.113.12.139.			IN	A

;; AUTHORITY SECTION:
.			120	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060300 1800 900 604800 86400

;; Query time: 118 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 03 16:18:47 CST 2024
;; MSG SIZE  rcvd: 107
Host info
Host 139.12.113.239.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.12.113.239.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
202.137.10.182 attackbots
2020-10-03 18:54:46.349468-0500  localhost sshd[2099]: Failed password for invalid user git from 202.137.10.182 port 37042 ssh2
2020-10-04 07:59:16
202.137.142.159 attack
" "
2020-10-04 08:18:10
88.241.47.169 attack
445/tcp 445/tcp
[2020-10-02]2pkt
2020-10-04 07:42:53
159.65.77.254 attack
SSH Invalid Login
2020-10-04 08:14:58
92.55.189.115 attackbotsspam
445/tcp 445/tcp
[2020-10-02]2pkt
2020-10-04 07:52:44
179.97.49.30 attackspam
1601671621 - 10/02/2020 22:47:01 Host: 179.97.49.30/179.97.49.30 Port: 445 TCP Blocked
...
2020-10-04 07:45:52
77.69.82.176 attack
Telnet Server BruteForce Attack
2020-10-04 08:20:28
183.83.52.20 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-10-04 08:00:21
212.47.241.15 attackspambots
Oct  3 23:01:15 staging sshd[193180]: Invalid user marjorie from 212.47.241.15 port 42554
Oct  3 23:01:15 staging sshd[193180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.47.241.15 
Oct  3 23:01:15 staging sshd[193180]: Invalid user marjorie from 212.47.241.15 port 42554
Oct  3 23:01:17 staging sshd[193180]: Failed password for invalid user marjorie from 212.47.241.15 port 42554 ssh2
...
2020-10-04 07:47:56
42.201.194.159 attackbots
445/tcp
[2020-10-02]1pkt
2020-10-04 08:06:00
95.217.226.22 attackspam
28 attempts against mh-misbehave-ban on wave
2020-10-04 07:54:34
193.124.59.213 attackspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-10-04 07:54:16
203.217.140.77 attackbotsspam
$f2bV_matches
2020-10-04 08:01:33
183.105.162.106 attack
23/tcp
[2020-10-02]1pkt
2020-10-04 07:50:51
113.200.60.74 attack
2020-10-03T23:18:52.453158amanda2.illicoweb.com sshd\[38906\]: Invalid user comercial from 113.200.60.74 port 53094
2020-10-03T23:18:52.458577amanda2.illicoweb.com sshd\[38906\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.200.60.74
2020-10-03T23:18:54.794983amanda2.illicoweb.com sshd\[38906\]: Failed password for invalid user comercial from 113.200.60.74 port 53094 ssh2
2020-10-03T23:28:05.630705amanda2.illicoweb.com sshd\[39484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.200.60.74  user=root
2020-10-03T23:28:07.888046amanda2.illicoweb.com sshd\[39484\]: Failed password for root from 113.200.60.74 port 41537 ssh2
...
2020-10-04 08:09:40

Recently Reported IPs

143.241.21.56 97.35.157.22 193.254.96.209 118.171.70.154
46.243.205.35 129.215.90.203 122.169.149.182 41.155.77.203
110.188.232.15 56.129.197.141 147.48.37.71 234.115.160.224
73.127.81.69 218.60.205.221 202.205.255.194 170.17.44.90
111.134.176.68 125.201.191.169 187.100.40.186 223.197.144.151