Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Stockholm

Region: Stockholms

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 31.13.72.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2653
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;31.13.72.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025010500 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 05 19:11:37 CST 2025
;; MSG SIZE  rcvd: 105
Host info
139.72.13.31.in-addr.arpa domain name pointer edgeray-latest-star-shv-01-arn2.facebook.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.72.13.31.in-addr.arpa	name = edgeray-latest-star-shv-01-arn2.facebook.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.162.235.213 attackbotsspam
Jan  9 12:44:09 ws24vmsma01 sshd[184604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.162.235.213
Jan  9 12:44:11 ws24vmsma01 sshd[184604]: Failed password for invalid user sym from 185.162.235.213 port 41476 ssh2
...
2020-01-10 00:59:12
122.4.46.177 attack
3389BruteforceStormFW21
2020-01-10 00:50:19
193.112.174.37 attack
Lines containing failures of 193.112.174.37
Jan  8 01:22:53 localhost sshd[1751300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.174.37  user=lp
Jan  8 01:22:55 localhost sshd[1751300]: Failed password for lp from 193.112.174.37 port 51302 ssh2
Jan  8 01:22:56 localhost sshd[1751300]: Received disconnect from 193.112.174.37 port 51302:11: Bye Bye [preauth]
Jan  8 01:22:56 localhost sshd[1751300]: Disconnected from authenticating user lp 193.112.174.37 port 51302 [preauth]
Jan  8 01:35:46 localhost sshd[1751885]: Invalid user orm from 193.112.174.37 port 51920
Jan  8 01:35:46 localhost sshd[1751885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.174.37
Jan  8 01:35:48 localhost sshd[1751885]: Failed password for invalid user orm from 193.112.174.37 port 51920 ssh2
Jan  8 01:35:48 localhost sshd[1751885]: Received disconnect from 193.112.174.37 port 51920:11: Bye Bye [prea........
------------------------------
2020-01-10 00:58:25
117.6.135.248 attackbots
Unauthorized connection attempt detected from IP address 117.6.135.248 to port 445
2020-01-10 01:02:01
117.50.1.12 attackspambots
detected by Fail2Ban
2020-01-10 01:27:53
40.113.149.104 attack
Jan  8 10:45:01 entropy sshd[21524]: Invalid user tokoyama from 40.113.149.104
Jan  8 10:45:03 entropy sshd[21524]: Failed password for invalid user tokoyama from 40.113.149.104 port 35606 ssh2
Jan  8 10:45:37 entropy sshd[21549]: Invalid user vagrant from 40.113.149.104
Jan  8 10:45:39 entropy sshd[21549]: Failed password for invalid user vagrant from 40.113.149.104 port 40110 ssh2
Jan  8 10:46:10 entropy sshd[21588]: Invalid user dani from 40.113.149.104
Jan  8 10:46:11 entropy sshd[21588]: Failed password for invalid user dani from 40.113.149.104 port 44092 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=40.113.149.104
2020-01-10 01:09:22
14.225.3.47 attackbotsspam
Jan  9 23:54:46 itv-usvr-01 sshd[7898]: Invalid user admin from 14.225.3.47
Jan  9 23:54:46 itv-usvr-01 sshd[7898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.225.3.47
Jan  9 23:54:46 itv-usvr-01 sshd[7898]: Invalid user admin from 14.225.3.47
Jan  9 23:54:48 itv-usvr-01 sshd[7898]: Failed password for invalid user admin from 14.225.3.47 port 46448 ssh2
Jan  9 23:56:54 itv-usvr-01 sshd[8001]: Invalid user scaner from 14.225.3.47
2020-01-10 01:11:40
71.70.90.201 attack
20/1/9@09:54:23: FAIL: Alarm-Network address from=71.70.90.201
20/1/9@09:54:23: FAIL: Alarm-Network address from=71.70.90.201
...
2020-01-10 01:03:03
62.234.62.206 attackbotsspam
Jan  9 16:02:16 server sshd\[28380\]: Invalid user irene from 62.234.62.206
Jan  9 16:02:16 server sshd\[28380\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.62.206 
Jan  9 16:02:18 server sshd\[28380\]: Failed password for invalid user irene from 62.234.62.206 port 53592 ssh2
Jan  9 16:06:25 server sshd\[29757\]: Invalid user irene from 62.234.62.206
Jan  9 16:06:25 server sshd\[29757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.62.206 
...
2020-01-10 01:03:28
86.164.43.16 attack
Telnet/23 MH Probe, BF, Hack -
2020-01-10 01:28:30
78.188.60.151 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2020-01-10 01:06:44
78.140.35.42 attack
port scan and connect, tcp 23 (telnet)
2020-01-10 01:14:52
222.186.190.17 attackbots
Jan  9 17:19:23 ip-172-31-62-245 sshd\[16760\]: Failed password for root from 222.186.190.17 port 38647 ssh2\
Jan  9 17:20:33 ip-172-31-62-245 sshd\[16777\]: Failed password for root from 222.186.190.17 port 31915 ssh2\
Jan  9 17:20:36 ip-172-31-62-245 sshd\[16777\]: Failed password for root from 222.186.190.17 port 31915 ssh2\
Jan  9 17:20:38 ip-172-31-62-245 sshd\[16777\]: Failed password for root from 222.186.190.17 port 31915 ssh2\
Jan  9 17:21:43 ip-172-31-62-245 sshd\[16806\]: Failed password for root from 222.186.190.17 port 27693 ssh2\
2020-01-10 01:23:17
194.67.208.212 attackbotsspam
Jan  9 17:18:42 IngegnereFirenze sshd[1221]: Failed password for invalid user testing from 194.67.208.212 port 36154 ssh2
...
2020-01-10 01:18:55
81.215.209.238 attackspam
Telnet/23 MH Probe, BF, Hack -
2020-01-10 01:27:17

Recently Reported IPs

144.80.195.64 31.13.72.12 31.13.72.232 161.110.70.113
170.187.11.110 17.158.222.146 69.227.59.181 50.247.76.74
27.60.54.226 37.146.253.95 229.13.237.0 93.71.92.147
19.139.165.90 167.240.250.63 80.47.33.180 17.130.174.99
29.216.85.9 30.169.176.112 164.146.2.57 96.48.176.177