Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Multicast Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 239.117.14.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29891
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;239.117.14.139.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 20:29:04 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 139.14.117.239.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.14.117.239.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
188.254.0.226 attackbots
Oct  6 02:27:56 vtv3 sshd\[9183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.226  user=root
Oct  6 02:27:58 vtv3 sshd\[9183\]: Failed password for root from 188.254.0.226 port 39646 ssh2
Oct  6 02:32:09 vtv3 sshd\[11343\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.226  user=root
Oct  6 02:32:10 vtv3 sshd\[11343\]: Failed password for root from 188.254.0.226 port 50458 ssh2
Oct  6 02:36:23 vtv3 sshd\[13732\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.226  user=root
Oct  6 02:48:25 vtv3 sshd\[19553\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.226  user=root
Oct  6 02:48:26 vtv3 sshd\[19553\]: Failed password for root from 188.254.0.226 port 37250 ssh2
Oct  6 02:52:34 vtv3 sshd\[21660\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188
2019-10-06 18:31:51
1.209.1.167 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 06-10-2019 04:45:30.
2019-10-06 18:30:19
35.201.243.170 attackbotsspam
2019-10-06T10:16:57.259462abusebot.cloudsearch.cf sshd\[23146\]: Invalid user Haslo123456 from 35.201.243.170 port 12042
2019-10-06 18:38:28
218.92.0.208 attack
Oct  6 12:40:56 eventyay sshd[5130]: Failed password for root from 218.92.0.208 port 61679 ssh2
Oct  6 12:40:58 eventyay sshd[5130]: Failed password for root from 218.92.0.208 port 61679 ssh2
Oct  6 12:41:00 eventyay sshd[5130]: Failed password for root from 218.92.0.208 port 61679 ssh2
...
2019-10-06 18:43:12
95.217.16.13 attackspambots
SQL Injection attack
2019-10-06 19:03:39
222.186.175.217 attackspam
Oct  6 06:40:26 xentho sshd[7430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.217  user=root
Oct  6 06:40:28 xentho sshd[7430]: Failed password for root from 222.186.175.217 port 58492 ssh2
Oct  6 06:40:33 xentho sshd[7430]: Failed password for root from 222.186.175.217 port 58492 ssh2
Oct  6 06:40:26 xentho sshd[7430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.217  user=root
Oct  6 06:40:28 xentho sshd[7430]: Failed password for root from 222.186.175.217 port 58492 ssh2
Oct  6 06:40:33 xentho sshd[7430]: Failed password for root from 222.186.175.217 port 58492 ssh2
Oct  6 06:40:26 xentho sshd[7430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.217  user=root
Oct  6 06:40:28 xentho sshd[7430]: Failed password for root from 222.186.175.217 port 58492 ssh2
Oct  6 06:40:33 xentho sshd[7430]: Failed password for root from 
...
2019-10-06 18:41:24
37.187.79.117 attack
2019-10-06T05:42:24.710875shield sshd\[28609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.79.117  user=root
2019-10-06T05:42:26.298001shield sshd\[28609\]: Failed password for root from 37.187.79.117 port 50254 ssh2
2019-10-06T05:46:29.840478shield sshd\[29064\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.79.117  user=root
2019-10-06T05:46:31.728571shield sshd\[29064\]: Failed password for root from 37.187.79.117 port 41877 ssh2
2019-10-06T05:50:35.132224shield sshd\[29385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.79.117  user=root
2019-10-06 18:23:48
178.33.67.12 attackspam
Oct  6 06:35:04 piServer sshd[17063]: Failed password for root from 178.33.67.12 port 48206 ssh2
Oct  6 06:39:02 piServer sshd[17323]: Failed password for root from 178.33.67.12 port 59434 ssh2
...
2019-10-06 18:46:14
45.55.38.39 attackbots
Oct  6 07:26:12 localhost sshd\[49070\]: Invalid user Chicken@123 from 45.55.38.39 port 50549
Oct  6 07:26:12 localhost sshd\[49070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.38.39
Oct  6 07:26:14 localhost sshd\[49070\]: Failed password for invalid user Chicken@123 from 45.55.38.39 port 50549 ssh2
Oct  6 07:30:19 localhost sshd\[49217\]: Invalid user Jelszo from 45.55.38.39 port 42237
Oct  6 07:30:19 localhost sshd\[49217\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.38.39
...
2019-10-06 19:00:48
106.52.174.139 attackbotsspam
Oct  6 08:59:31 MK-Soft-VM6 sshd[10511]: Failed password for root from 106.52.174.139 port 50490 ssh2
...
2019-10-06 19:02:46
148.70.204.218 attackspam
Oct  6 05:43:52 reporting7 sshd[5472]: User r.r from 148.70.204.218 not allowed because not listed in AllowUsers
Oct  6 05:43:52 reporting7 sshd[5472]: Failed password for invalid user r.r from 148.70.204.218 port 34592 ssh2
Oct  6 06:00:56 reporting7 sshd[6947]: User r.r from 148.70.204.218 not allowed because not listed in AllowUsers
Oct  6 06:00:56 reporting7 sshd[6947]: Failed password for invalid user r.r from 148.70.204.218 port 48098 ssh2
Oct  6 06:06:03 reporting7 sshd[7413]: User r.r from 148.70.204.218 not allowed because not listed in AllowUsers
Oct  6 06:06:03 reporting7 sshd[7413]: Failed password for invalid user r.r from 148.70.204.218 port 58530 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=148.70.204.218
2019-10-06 18:48:23
181.52.236.67 attackbotsspam
2019-10-06T10:23:57.830683hub.schaetter.us sshd\[19108\]: Invalid user Tueur-123 from 181.52.236.67 port 41180
2019-10-06T10:23:57.837212hub.schaetter.us sshd\[19108\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.52.236.67
2019-10-06T10:23:59.206499hub.schaetter.us sshd\[19108\]: Failed password for invalid user Tueur-123 from 181.52.236.67 port 41180 ssh2
2019-10-06T10:28:14.091790hub.schaetter.us sshd\[19159\]: Invalid user P@rola@1 from 181.52.236.67 port 45346
2019-10-06T10:28:14.101248hub.schaetter.us sshd\[19159\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.52.236.67
...
2019-10-06 18:45:29
194.37.92.48 attackspambots
Oct  6 08:03:56 SilenceServices sshd[23768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.37.92.48
Oct  6 08:03:58 SilenceServices sshd[23768]: Failed password for invalid user Law@2017 from 194.37.92.48 port 59766 ssh2
Oct  6 08:08:26 SilenceServices sshd[24971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.37.92.48
2019-10-06 19:05:09
51.77.48.139 attackbots
Oct  6 04:15:15 Tower sshd[39771]: Connection from 51.77.48.139 port 53218 on 192.168.10.220 port 22
Oct  6 04:15:16 Tower sshd[39771]: Invalid user dice from 51.77.48.139 port 53218
Oct  6 04:15:16 Tower sshd[39771]: error: Could not get shadow information for NOUSER
Oct  6 04:15:16 Tower sshd[39771]: Failed password for invalid user dice from 51.77.48.139 port 53218 ssh2
Oct  6 04:15:16 Tower sshd[39771]: Received disconnect from 51.77.48.139 port 53218:11: Bye Bye [preauth]
Oct  6 04:15:16 Tower sshd[39771]: Disconnected from invalid user dice 51.77.48.139 port 53218 [preauth]
2019-10-06 19:00:27
43.225.157.91 attackbots
Oct  6 09:56:22 MK-Soft-VM4 sshd[23143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.225.157.91 
Oct  6 09:56:24 MK-Soft-VM4 sshd[23143]: Failed password for invalid user Haslo!qaz from 43.225.157.91 port 39444 ssh2
...
2019-10-06 19:01:11

Recently Reported IPs

83.8.84.8 237.84.134.225 118.210.197.203 38.16.28.75
207.215.4.196 46.78.60.56 128.21.252.201 58.241.163.21
128.204.125.96 34.221.19.112 239.98.44.206 189.116.188.29
237.105.200.57 243.239.101.99 53.236.113.44 36.25.29.59
163.24.66.58 203.85.6.156 125.1.46.211 25.154.140.229