Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Romania

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.2.139.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8206
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;5.2.139.213.			IN	A

;; AUTHORITY SECTION:
.			261	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019103000 1800 900 604800 86400

;; Query time: 105 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 30 19:17:24 CST 2019
;; MSG SIZE  rcvd: 115
Host info
213.139.2.5.in-addr.arpa domain name pointer static-5-2-139-213.rdsnet.ro.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
213.139.2.5.in-addr.arpa	name = static-5-2-139-213.rdsnet.ro.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
122.227.230.11 attackspambots
suspicious action Sat, 22 Feb 2020 11:54:31 -0300
2020-02-22 23:14:22
27.105.97.234 attackbotsspam
Unauthorized connection attempt detected from IP address 27.105.97.234 to port 23
2020-02-22 23:12:30
149.56.129.129 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-02-22 23:24:01
104.192.224.18 attack
02/22/2020-08:54:56.415920 104.192.224.18 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-02-22 23:40:26
101.89.115.211 attack
Feb 22 14:06:52 legacy sshd[18307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.115.211
Feb 22 14:06:54 legacy sshd[18307]: Failed password for invalid user vmail from 101.89.115.211 port 46952 ssh2
Feb 22 14:11:23 legacy sshd[18368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.115.211
...
2020-02-22 23:25:20
46.235.44.69 attackbots
PHISHING SPAM !
2020-02-22 23:36:40
82.76.196.131 attackspambots
DATE:2020-02-22 15:49:26, IP:82.76.196.131, PORT:ssh SSH brute force auth (docker-dc)
2020-02-22 23:18:03
23.129.64.227 attackspam
suspicious action Sat, 22 Feb 2020 10:11:50 -0300
2020-02-22 23:05:07
222.79.184.36 attackbots
$f2bV_matches
2020-02-22 23:27:22
106.75.174.87 attack
Feb 22 15:59:28 silence02 sshd[24673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.174.87
Feb 22 15:59:30 silence02 sshd[24673]: Failed password for invalid user phoenix from 106.75.174.87 port 58154 ssh2
Feb 22 16:03:01 silence02 sshd[24995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.174.87
2020-02-22 23:04:52
112.85.42.182 attackbots
Feb 22 16:14:56 sso sshd[364]: Failed password for root from 112.85.42.182 port 56974 ssh2
Feb 22 16:15:07 sso sshd[364]: Failed password for root from 112.85.42.182 port 56974 ssh2
...
2020-02-22 23:20:52
200.114.236.19 attackspambots
$f2bV_matches
2020-02-22 23:14:53
80.82.78.100 attack
80.82.78.100 was recorded 24 times by 13 hosts attempting to connect to the following ports: 1646,2123,5123. Incident counter (4h, 24h, all-time): 24, 131, 19353
2020-02-22 23:29:41
159.203.64.91 attackspambots
$f2bV_matches
2020-02-22 23:46:39
45.148.10.171 attackbots
45.148.10.171 - - [22/Feb/2020:19:36:26 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2"
...
2020-02-22 23:45:45

Recently Reported IPs

205.149.148.219 181.21.183.186 253.161.219.202 52.164.4.46
36.78.82.184 189.209.3.17 18.22.109.83 151.130.131.32
211.173.141.96 106.211.236.252 222.252.119.12 74.206.28.76
94.152.106.95 20.155.162.19 87.231.120.23 198.220.217.147
245.220.188.190 61.13.243.75 181.174.106.84 137.50.77.253