Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Cherkessk

Region: Karachayevo-Cherkesiya Republic

Country: Russian Federation

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.139.250.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40881
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;5.139.250.92.			IN	A

;; AUTHORITY SECTION:
.			407	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020010102 1800 900 604800 86400

;; Query time: 116 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 02 03:03:49 CST 2020
;; MSG SIZE  rcvd: 116
Host info
92.250.139.5.in-addr.arpa domain name pointer host-5-139-250-92.stavropol.su.
Nslookup info:
Server:		100.100.2.136
Address:	100.100.2.136#53

Non-authoritative answer:
92.250.139.5.in-addr.arpa	name = host-5-139-250-92.stavropol.ru.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
27.54.184.196 attack
ssh failed login
2019-06-26 05:39:20
218.89.48.175 attackspambots
imap. Password mismatch
2019-06-26 05:19:32
1.32.249.146 attack
445/tcp 445/tcp
[2019-06-22/25]2pkt
2019-06-26 05:37:35
79.101.41.129 attackbots
ECShop Remote Code Execution Vulnerability
2019-06-26 05:40:30
187.87.12.158 attackbotsspam
libpam_shield report: forced login attempt
2019-06-26 05:33:33
14.85.88.4 attackspambots
imap. Unknown user
2019-06-26 05:17:43
14.226.188.35 attackbotsspam
Unauthorized connection attempt from IP address 14.226.188.35 on Port 445(SMB)
2019-06-26 05:25:42
182.131.125.7 attack
imap. Unknown user
2019-06-26 05:10:54
5.188.86.114 attackspambots
Jun 25 21:45:37 h2177944 kernel: \[2835868.836820\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=5.188.86.114 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=27787 PROTO=TCP SPT=42373 DPT=30601 WINDOW=1024 RES=0x00 SYN URGP=0 
Jun 25 22:04:39 h2177944 kernel: \[2837010.387240\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=5.188.86.114 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=23390 PROTO=TCP SPT=42373 DPT=34014 WINDOW=1024 RES=0x00 SYN URGP=0 
Jun 25 22:17:19 h2177944 kernel: \[2837770.849450\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=5.188.86.114 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=54791 PROTO=TCP SPT=42373 DPT=26042 WINDOW=1024 RES=0x00 SYN URGP=0 
Jun 25 22:32:16 h2177944 kernel: \[2838667.968558\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=5.188.86.114 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=64114 PROTO=TCP SPT=42373 DPT=3134 WINDOW=1024 RES=0x00 SYN URGP=0 
Jun 25 22:45:48 h2177944 kernel: \[2839479.394854\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=5.188.86.114 DST=85.214.117.9 L
2019-06-26 05:50:43
196.31.146.252 attackbots
445/tcp 445/tcp 445/tcp...
[2019-04-27/06-25]4pkt,1pt.(tcp)
2019-06-26 05:53:07
186.249.217.119 attackspambots
25.06.2019 19:16:16 - Login Fail on hMailserver 
Detected by ELinOX-hMail-A2F
2019-06-26 05:14:32
190.122.109.114 attackspambots
Unauthorized connection attempt from IP address 190.122.109.114 on Port 445(SMB)
2019-06-26 05:44:08
111.75.167.157 attack
imap. Unknown user
2019-06-26 05:20:34
61.216.108.205 attackspam
139/tcp 139/tcp
[2019-06-19/25]2pkt
2019-06-26 05:38:56
183.90.238.12 attack
http
2019-06-26 05:48:32

Recently Reported IPs

150.159.192.49 215.210.113.137 161.135.152.212 115.203.178.52
96.76.40.27 150.105.228.24 220.166.6.159 60.185.132.140
37.69.30.122 143.188.103.170 24.42.189.78 88.48.166.180
91.70.81.156 110.138.166.146 71.238.58.213 91.153.69.223
169.24.69.60 87.9.205.120 98.124.42.109 92.173.134.5