Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.139.90.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43376
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.139.90.242.			IN	A

;; AUTHORITY SECTION:
.			219	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040300 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 03 20:32:43 CST 2022
;; MSG SIZE  rcvd: 105
Host info
242.90.139.5.in-addr.arpa domain name pointer 242.90.139.5.donpac.ru.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.90.139.5.in-addr.arpa	name = 242.90.139.5.donpac.ru.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
119.92.127.123 attack
Icarus honeypot on github
2020-09-10 04:32:42
106.75.141.223 attack
 UDP 106.75.141.223:58914 -> port 30311, len 72
2020-09-10 04:19:39
218.237.253.167 attack
2020-09-09 22:07:59,903 fail2ban.actions: WARNING [ssh] Ban 218.237.253.167
2020-09-10 04:25:10
104.248.66.115 attack
Fail2Ban Ban Triggered (2)
2020-09-10 04:51:30
119.45.151.241 attackspambots
SSH brute-force attempt
2020-09-10 04:26:08
85.27.207.59 attackbotsspam
Sep  9 12:56:06 aragorn sshd[16308]: Invalid user admin from 85.27.207.59
Sep  9 12:56:07 aragorn sshd[16310]: Invalid user admin from 85.27.207.59
Sep  9 12:56:08 aragorn sshd[16312]: Invalid user admin from 85.27.207.59
Sep  9 12:56:09 aragorn sshd[16314]: Invalid user admin from 85.27.207.59
...
2020-09-10 04:47:10
112.85.42.67 attackspam
Sep  9 16:34:43 plusreed sshd[8244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.67  user=root
Sep  9 16:34:45 plusreed sshd[8244]: Failed password for root from 112.85.42.67 port 25961 ssh2
...
2020-09-10 04:46:37
104.206.128.66 attackspam
Icarus honeypot on github
2020-09-10 04:18:06
159.65.131.92 attack
Sep  9 16:54:52 ns3033917 sshd[9686]: Failed password for root from 159.65.131.92 port 60960 ssh2
Sep  9 16:56:37 ns3033917 sshd[9717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.131.92  user=root
Sep  9 16:56:39 ns3033917 sshd[9717]: Failed password for root from 159.65.131.92 port 55368 ssh2
...
2020-09-10 04:25:32
185.191.171.22 attackbots
185.191.171.22
2020-09-10 04:45:53
118.188.20.5 attack
Sep  9 22:37:33 ift sshd\[4228\]: Invalid user cpanel from 118.188.20.5Sep  9 22:37:34 ift sshd\[4228\]: Failed password for invalid user cpanel from 118.188.20.5 port 38666 ssh2Sep  9 22:40:10 ift sshd\[4676\]: Failed password for root from 118.188.20.5 port 42122 ssh2Sep  9 22:42:36 ift sshd\[4885\]: Failed password for root from 118.188.20.5 port 45580 ssh2Sep  9 22:44:52 ift sshd\[4976\]: Failed password for root from 118.188.20.5 port 49040 ssh2
...
2020-09-10 04:12:50
216.170.114.10 attackspam
1599670589 - 09/09/2020 18:56:29 Host: 216.170.114.10/216.170.114.10 Port: 445 TCP Blocked
2020-09-10 04:32:15
190.8.42.10 attack
Firewall Dropped Connection
2020-09-10 04:21:57
104.140.188.42 attackbots
1599679002 - 09/10/2020 02:16:42 Host: cbfd1.rederatural.com/104.140.188.42 Port: 23 TCP Blocked
...
2020-09-10 04:14:32
139.162.106.181 attackbotsspam
139.162.106.181 - - [09/Sep/2020:19:35:24 +0200] "GET / HTTP/1.1" 301 670 "-" "HTTP Banner Detection (https://security.ipip.net)"
...
2020-09-10 04:49:14

Recently Reported IPs

91.127.236.232 161.27.65.233 127.181.91.143 33.149.84.38
117.158.122.166 64.121.233.251 178.249.209.9 88.105.225.103
76.212.26.142 175.142.117.225 184.81.97.95 70.223.226.250
39.115.2.219 40.111.249.223 254.213.122.137 247.247.95.169
86.102.87.140 49.201.220.213 14.177.7.224 208.24.166.181