Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Multicast Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 239.122.139.182
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59066
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;239.122.139.182.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 102 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 11:26:46 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 182.139.122.239.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 182.139.122.239.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
209.188.21.99 attackspam
scans 7 times in preceeding hours on the ports (in chronological order) 3148 3225 3137 3101 3161 3202 3216
2020-04-17 03:58:32
141.98.81.253 attackspam
scans 2 times in preceeding hours on the ports (in chronological order) 33891 33894
2020-04-17 04:09:12
203.205.26.113 attackbots
probes 25 times on the port 5555
2020-04-17 04:00:58
162.250.120.119 attackspam
probes 14 times on the port 52869
2020-04-17 04:07:40
177.19.165.26 attack
Unauthorized IMAP connection attempt
2020-04-17 04:20:45
178.176.175.42 attackbots
SMTP AUTH LOGIN
2020-04-17 03:46:54
81.95.136.242 attackbotsspam
Apr 16 15:39:32 ws22vmsma01 sshd[50013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.95.136.242
Apr 16 15:39:34 ws22vmsma01 sshd[50013]: Failed password for invalid user af from 81.95.136.242 port 51154 ssh2
...
2020-04-17 03:48:07
173.214.175.217 attackbotsspam
(smtpauth) Failed SMTP AUTH login from 173.214.175.217 (US/United States/12.com): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-04-16 21:54:02 login authenticator failed for (ADMIN) [173.214.175.217]: 535 Incorrect authentication data (set_id=foroosh@ajorkowsar.com)
2020-04-17 03:47:50
167.172.207.15 attackbots
Automatic report - Port Scan Attack
2020-04-17 04:14:20
139.59.135.84 attackbotsspam
Apr 16 16:40:16 ws19vmsma01 sshd[53795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.135.84
Apr 16 16:40:19 ws19vmsma01 sshd[53795]: Failed password for invalid user c from 139.59.135.84 port 46922 ssh2
...
2020-04-17 03:55:20
209.141.53.42 attack
scans 2 times in preceeding hours on the ports (in chronological order) 8088 8088
2020-04-17 03:58:58
188.226.128.250 attack
scans 2 times in preceeding hours on the ports (in chronological order) 18279 30130
2020-04-17 04:02:35
159.117.65.102 attack
probes 18 times on the port 7708
2020-04-17 04:08:05
167.172.171.234 attackspam
$f2bV_matches
2020-04-17 04:20:08
167.172.124.143 attack
" "
2020-04-17 04:05:50

Recently Reported IPs

156.106.108.155 225.190.136.56 65.80.8.41 170.84.104.146
29.53.47.99 147.224.86.84 190.78.103.72 21.59.204.241
175.135.30.71 141.53.202.233 249.231.117.6 228.31.33.90
212.71.243.117 213.222.186.225 205.139.47.15 69.104.18.89
64.79.131.62 155.216.152.5 6.43.138.46 88.155.251.93