Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Alytus

Region: Alytus

Country: Republic of Lithuania

Internet Service Provider: unknown

Hostname: unknown

Organization: UAB Cgates

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.20.67.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63145
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;5.20.67.239.			IN	A

;; AUTHORITY SECTION:
.			2033	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051600 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu May 16 21:37:49 CST 2019
;; MSG SIZE  rcvd: 115

Host info
239.67.20.5.in-addr.arpa domain name pointer data-67-239.cgates.lt.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
239.67.20.5.in-addr.arpa	name = data-67-239.cgates.lt.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
2001:41d0:203:6706:: attackbots
WordPress login Brute force / Web App Attack on client site.
2020-09-12 20:25:13
41.216.156.66 attackspambots
Automatic report - Port Scan Attack
2020-09-12 20:30:14
82.64.15.106 attackspam
Invalid user pi from 82.64.15.106 port 54200
2020-09-12 20:22:36
158.69.0.38 attackbots
Invalid user wordpress from 158.69.0.38 port 47098
2020-09-12 20:01:53
5.188.87.58 attackbotsspam
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-12T12:04:19Z
2020-09-12 20:29:17
20.52.44.92 attackbots
DE US/United States/- Hits: 11
2020-09-12 20:12:31
122.51.180.34 attackbotsspam
ssh brute force
2020-09-12 20:21:40
40.73.77.193 attack
Automatic report - Banned IP Access
2020-09-12 20:24:46
51.38.118.26 attackbots
Sep 12 08:38:03 scw-focused-cartwright sshd[2051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.118.26
Sep 12 08:38:05 scw-focused-cartwright sshd[2051]: Failed password for invalid user admin from 51.38.118.26 port 42428 ssh2
2020-09-12 20:36:12
61.154.97.241 attackspambots
Brute forcing email accounts
2020-09-12 20:22:54
123.206.226.149 attack
Invalid user cloud from 123.206.226.149 port 42224
2020-09-12 20:35:45
103.76.252.6 attackbots
...
2020-09-12 20:05:16
167.114.185.237 attackbotsspam
...
2020-09-12 20:01:32
222.186.30.57 attackbots
Sep 12 13:51:04 vps639187 sshd\[2703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.57  user=root
Sep 12 13:51:06 vps639187 sshd\[2703\]: Failed password for root from 222.186.30.57 port 21769 ssh2
Sep 12 13:51:08 vps639187 sshd\[2703\]: Failed password for root from 222.186.30.57 port 21769 ssh2
...
2020-09-12 20:06:04
45.148.122.161 attack
Port scanning [3 denied]
2020-09-12 20:33:42

Recently Reported IPs

171.6.56.248 31.248.94.72 191.25.169.83 165.169.140.233
154.38.88.71 205.96.157.134 81.181.90.34 142.30.242.47
195.115.245.183 185.133.96.61 65.71.68.10 118.70.171.157
70.150.13.221 213.80.107.171 93.38.85.184 121.253.246.248
178.120.97.14 45.204.183.100 223.63.182.46 139.194.200.173