Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 240.104.165.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63300
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;240.104.165.139.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 01:56:24 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 139.165.104.240.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.165.104.240.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
15.216.241.89 attackspambots
Scan detected and blocked 2020.03.06 14:29:53
2020-03-07 03:04:45
222.186.30.57 attackbots
Mar  7 00:13:11 areeb-Workstation sshd[32116]: Failed password for root from 222.186.30.57 port 45989 ssh2
Mar  7 00:13:15 areeb-Workstation sshd[32116]: Failed password for root from 222.186.30.57 port 45989 ssh2
...
2020-03-07 02:48:31
161.0.118.13 attackbotsspam
Honeypot attack, port: 5555, PTR: 13.118.0.161.dyn.rvrnetwork.com.
2020-03-07 03:27:11
112.131.210.243 attack
Scan detected and blocked 2020.03.06 14:29:34
2020-03-07 03:20:35
114.67.67.129 attackbotsspam
Triggered: repeated knocking on closed ports.
2020-03-07 02:51:49
70.122.151.129 attackbots
firewall-block, port(s): 4567/tcp
2020-03-07 02:52:06
213.89.32.220 attackspam
Honeypot attack, port: 5555, PTR: c213-89-32-220.bredband.comhem.se.
2020-03-07 03:16:44
185.93.2.76 attack
Potential Directory Traversal Attempt.
2020-03-07 03:21:48
89.144.47.246 attack
Port 3389 (MS RDP) access denied
2020-03-07 02:47:20
123.206.69.81 attack
Mar  6 06:55:16 web1 sshd\[28643\]: Invalid user sinusbot from 123.206.69.81
Mar  6 06:55:16 web1 sshd\[28643\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.69.81
Mar  6 06:55:19 web1 sshd\[28643\]: Failed password for invalid user sinusbot from 123.206.69.81 port 51429 ssh2
Mar  6 06:59:13 web1 sshd\[29036\]: Invalid user bitbucket from 123.206.69.81
Mar  6 06:59:13 web1 sshd\[29036\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.69.81
2020-03-07 03:15:51
112.252.120.99 attackbots
Scan detected and blocked 2020.03.06 14:29:46
2020-03-07 03:09:47
114.67.69.85 attack
Mar  6 sshd[29474]: Invalid user teamspeak from 114.67.69.85 port 40956
2020-03-07 02:56:40
192.241.217.251 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-07 03:19:08
183.136.239.37 attackspambots
suspicious action Fri, 06 Mar 2020 10:29:32 -0300
2020-03-07 03:23:45
110.170.166.101 attack
Mar  6 16:08:41 dev0-dcde-rnet sshd[14997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.170.166.101
Mar  6 16:08:43 dev0-dcde-rnet sshd[14997]: Failed password for invalid user oracle from 110.170.166.101 port 52552 ssh2
Mar  6 16:12:45 dev0-dcde-rnet sshd[15052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.170.166.101
2020-03-07 03:24:18

Recently Reported IPs

130.170.139.71 231.16.153.51 225.25.152.246 171.29.136.197
182.164.34.126 103.41.59.32 230.116.44.92 131.87.70.245
128.26.111.158 130.122.236.88 153.30.155.129 226.196.155.161
12.56.173.35 193.168.67.76 38.224.143.233 135.83.115.64
93.252.171.109 62.168.64.226 10.46.140.243 3.162.224.51