Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 240.12.49.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52442
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;240.12.49.139.			IN	A

;; AUTHORITY SECTION:
.			554	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019120700 1800 900 604800 86400

;; Query time: 118 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 07 17:52:13 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 139.49.12.240.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.49.12.240.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
47.94.155.233 attack
47.94.155.233 - - [24/Apr/2020:14:10:03 +0200] "GET /wp-login.php HTTP/1.1" 200 5686 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
47.94.155.233 - - [24/Apr/2020:14:10:12 +0200] "POST /wp-login.php HTTP/1.1" 200 5937 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
47.94.155.233 - - [24/Apr/2020:14:10:15 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-04-24 20:40:51
85.209.0.80 attack
Triggered: repeated knocking on closed ports.
2020-04-24 21:06:18
223.247.141.127 attackbots
Apr 24 06:37:04 server1 sshd\[13249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.141.127 
Apr 24 06:37:06 server1 sshd\[13249\]: Failed password for invalid user carrie from 223.247.141.127 port 57036 ssh2
Apr 24 06:41:40 server1 sshd\[7541\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.141.127  user=root
Apr 24 06:41:42 server1 sshd\[7541\]: Failed password for root from 223.247.141.127 port 56694 ssh2
Apr 24 06:46:37 server1 sshd\[6442\]: Invalid user tangerine from 223.247.141.127
...
2020-04-24 21:06:46
2404:a300:0:180:0:1:aa0:2bfd attackspam
xmlrpc attack
2020-04-24 20:38:22
51.158.127.70 attack
2020-04-24T12:42:27.299381shield sshd\[4972\]: Invalid user vagrant from 51.158.127.70 port 36082
2020-04-24T12:42:27.304069shield sshd\[4972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.127.70
2020-04-24T12:42:29.413855shield sshd\[4972\]: Failed password for invalid user vagrant from 51.158.127.70 port 36082 ssh2
2020-04-24T12:48:58.551865shield sshd\[6376\]: Invalid user col from 51.158.127.70 port 49568
2020-04-24T12:48:58.556605shield sshd\[6376\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.127.70
2020-04-24 21:00:53
45.55.65.92 attack
Fail2Ban Ban Triggered
2020-04-24 20:59:35
151.45.44.166 attack
Web Probe / Attack
2020-04-24 20:59:00
183.159.114.151 attack
[Fri Apr 24 09:43:55 2020 GMT] meini@hotmail.com [RDNS_NONE], Subject: 发票 13690131927
2020-04-24 20:44:27
222.186.175.216 attackbotsspam
DATE:2020-04-24 14:57:51, IP:222.186.175.216, PORT:ssh SSH brute force auth on honeypot server (epe-honey1-hq)
2020-04-24 20:58:17
211.252.87.90 attack
Apr 24 14:20:39 server sshd[24856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.252.87.90
Apr 24 14:20:41 server sshd[24856]: Failed password for invalid user libuuid from 211.252.87.90 port 46899 ssh2
Apr 24 14:25:50 server sshd[25291]: Failed password for root from 211.252.87.90 port 29438 ssh2
...
2020-04-24 20:35:04
41.93.45.116 attack
Brute-Force login attempt to QNap server in US using userid "admin". 264 attempts in 3-min period.
2020-04-24 20:38:55
110.40.14.20 attack
Apr 24 14:29:06 plex sshd[21540]: Invalid user mdpi from 110.40.14.20 port 51634
2020-04-24 20:49:05
2.227.254.144 attackspambots
fail2ban/Apr 24 14:05:26 h1962932 sshd[1350]: Invalid user caicai from 2.227.254.144 port 40253
Apr 24 14:05:26 h1962932 sshd[1350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.227.254.144
Apr 24 14:05:26 h1962932 sshd[1350]: Invalid user caicai from 2.227.254.144 port 40253
Apr 24 14:05:28 h1962932 sshd[1350]: Failed password for invalid user caicai from 2.227.254.144 port 40253 ssh2
Apr 24 14:10:51 h1962932 sshd[1498]: Invalid user webmaster from 2.227.254.144 port 50132
2020-04-24 21:08:36
171.96.79.254 attackbots
Automatic report - Port Scan Attack
2020-04-24 21:07:45
222.186.30.112 attack
Apr 24 14:52:41 minden010 sshd[28499]: Failed password for root from 222.186.30.112 port 11192 ssh2
Apr 24 14:52:43 minden010 sshd[28499]: Failed password for root from 222.186.30.112 port 11192 ssh2
Apr 24 14:52:46 minden010 sshd[28499]: Failed password for root from 222.186.30.112 port 11192 ssh2
...
2020-04-24 20:55:57

Recently Reported IPs

203.163.247.94 120.253.205.170 177.8.49.205 173.236.145.100
177.85.60.17 116.110.253.171 92.171.170.214 197.62.135.181
92.174.242.138 181.48.61.150 223.97.28.220 81.214.63.126
146.120.184.48 105.18.54.203 186.236.104.178 73.62.188.65
177.125.224.38 80.211.239.110 42.118.70.248 187.19.10.209