Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.142.139.255
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24576
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.142.139.255.			IN	A

;; AUTHORITY SECTION:
.			470	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 11:33:07 CST 2022
;; MSG SIZE  rcvd: 106
Host info
255.139.142.5.in-addr.arpa domain name pointer 255-139-142-5.baltnet.ru.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
255.139.142.5.in-addr.arpa	name = 255-139-142-5.baltnet.ru.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
208.109.53.185 attackspambots
C1,WP GET /suche/wp-login.php
2020-05-04 00:42:30
79.124.62.55 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 63 - port: 3389 proto: TCP cat: Misc Attack
2020-05-04 00:59:24
185.50.149.9 attackspambots
May  3 18:36:05 websrv1.aknwsrv.net postfix/smtpd[350422]: warning: unknown[185.50.149.9]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May  3 18:36:05 websrv1.aknwsrv.net postfix/smtpd[350422]: lost connection after AUTH from unknown[185.50.149.9]
May  3 18:36:12 websrv1.aknwsrv.net postfix/smtpd[350040]: lost connection after AUTH from unknown[185.50.149.9]
May  3 18:36:18 websrv1.aknwsrv.net postfix/smtpd[350445]: lost connection after AUTH from unknown[185.50.149.9]
May  3 18:36:23 websrv1.aknwsrv.net postfix/smtpd[350422]: lost connection after CONNECT from unknown[185.50.149.9]
2020-05-04 01:12:12
78.128.113.42 attack
May  3 18:55:56 debian-2gb-nbg1-2 kernel: \[10783859.398134\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=78.128.113.42 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=3355 PROTO=TCP SPT=43475 DPT=7442 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-04 01:00:26
50.16.241.113 attackspambots
AS ALWAYS WITH AMAZON WEB SERVICES
2020-05-04 00:35:58
66.150.67.145 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 03-05-2020 13:10:18.
2020-05-04 00:49:38
185.175.93.17 attackspambots
05/03/2020-11:10:30.438007 185.175.93.17 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-04 00:45:45
212.64.57.148 attack
[AUTOMATIC REPORT] - 21 tries in total - SSH BRUTE FORCE - IP banned
2020-05-04 01:06:47
198.108.66.110 attackspam
Port probing on unauthorized port 8088
2020-05-04 00:25:52
35.198.48.78 attack
35.198.48.78 - - [03/May/2020:14:10:09 +0200] "GET /wp-login.php HTTP/1.1" 200 5702 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
35.198.48.78 - - [03/May/2020:14:10:11 +0200] "POST /wp-login.php HTTP/1.1" 200 5953 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
35.198.48.78 - - [03/May/2020:14:10:13 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-04 00:57:27
41.66.38.192 attackbotsspam
firewall-block, port(s): 445/tcp
2020-05-04 01:09:21
222.186.42.155 attack
May  3 18:41:17 mellenthin sshd[1052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155  user=root
May  3 18:41:19 mellenthin sshd[1052]: Failed password for invalid user root from 222.186.42.155 port 28130 ssh2
2020-05-04 00:42:00
103.42.172.167 attackspambots
firewall-block, port(s): 445/tcp
2020-05-04 00:46:12
64.225.47.91 attackbots
05/03/2020-10:25:21.885538 64.225.47.91 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-04 01:03:28
162.248.52.82 attackbotsspam
2020-05-03T16:18:41.100217struts4.enskede.local sshd\[22486\]: Invalid user tnc from 162.248.52.82 port 37458
2020-05-03T16:18:41.107389struts4.enskede.local sshd\[22486\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.248.52.82
2020-05-03T16:18:44.181366struts4.enskede.local sshd\[22486\]: Failed password for invalid user tnc from 162.248.52.82 port 37458 ssh2
2020-05-03T16:25:45.568521struts4.enskede.local sshd\[22505\]: Invalid user kll from 162.248.52.82 port 57886
2020-05-03T16:25:45.576107struts4.enskede.local sshd\[22505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.248.52.82
...
2020-05-04 00:47:03

Recently Reported IPs

5.139.47.171 5.136.72.144 5.157.102.251 5.163.120.101
5.164.204.184 5.164.55.101 5.166.168.169 5.167.56.94
5.164.8.123 5.165.20.194 5.164.31.91 5.173.158.60
5.181.170.17 5.202.136.153 5.202.144.184 5.202.157.173
5.202.223.64 5.202.209.178 5.211.8.25 5.204.125.65