Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Portsmouth

Region: England

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.71.52.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45354
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.71.52.139.			IN	A

;; AUTHORITY SECTION:
.			571	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062301 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 24 07:58:01 CST 2022
;; MSG SIZE  rcvd: 104
Host info
139.52.71.5.in-addr.arpa domain name pointer 0547348b.skybroadband.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.52.71.5.in-addr.arpa	name = 0547348b.skybroadband.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
118.37.91.137 attackspambots
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-16 05:11:15
210.65.138.63 attack
Dec  2 08:46:02 ms-srv sshd[31456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.65.138.63
Dec  2 08:46:04 ms-srv sshd[31456]: Failed password for invalid user madera from 210.65.138.63 port 34047 ssh2
2020-02-16 05:36:36
144.76.174.242 attackspam
Feb 15 21:47:03 grey postfix/smtp\[9597\]: 6A713305A800: to=\, relay=mx.df.com.cust.b.hostedemail.com\[64.98.36.4\]:25, delay=231487, delays=231487/0.09/0.43/0, dsn=4.7.1, status=deferred \(host mx.df.com.cust.b.hostedemail.com\[64.98.36.4\] refused to talk to me: 554 5.7.1 Service unavailable\; Client host \[144.76.174.242\] blocked using urbl.hostedemail.com\; Your IP has been manually blacklisted\)
...
2020-02-16 05:38:41
118.37.218.113 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 05:31:39
89.248.172.169 attack
fire
2020-02-16 05:44:26
210.74.13.5 attackspambots
Dec 22 17:56:03 ms-srv sshd[6077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.74.13.5
Dec 22 17:56:05 ms-srv sshd[6077]: Failed password for invalid user testing from 210.74.13.5 port 52380 ssh2
2020-02-16 05:14:54
5.53.158.34 attack
1581774438 - 02/15/2020 14:47:18 Host: 5.53.158.34/5.53.158.34 Port: 445 TCP Blocked
2020-02-16 05:27:35
36.67.150.241 attackbots
Automatic report - Port Scan Attack
2020-02-16 05:40:10
118.37.74.140 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 05:13:43
177.52.255.244 attack
Feb 15 22:27:41 pornomens sshd\[5900\]: Invalid user alarm from 177.52.255.244 port 36192
Feb 15 22:27:41 pornomens sshd\[5900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.52.255.244
Feb 15 22:27:43 pornomens sshd\[5900\]: Failed password for invalid user alarm from 177.52.255.244 port 36192 ssh2
...
2020-02-16 05:29:48
200.160.121.97 attackbots
Feb 10 13:11:40 newdogma sshd[28708]: Invalid user nhe from 200.160.121.97 port 30877
Feb 10 13:11:40 newdogma sshd[28708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.160.121.97
Feb 10 13:11:42 newdogma sshd[28708]: Failed password for invalid user nhe from 200.160.121.97 port 30877 ssh2
Feb 10 13:11:42 newdogma sshd[28708]: Received disconnect from 200.160.121.97 port 30877:11: Bye Bye [preauth]
Feb 10 13:11:42 newdogma sshd[28708]: Disconnected from 200.160.121.97 port 30877 [preauth]
Feb 10 13:20:57 newdogma sshd[28824]: Invalid user ody from 200.160.121.97 port 32164
Feb 10 13:20:57 newdogma sshd[28824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.160.121.97
Feb 10 13:20:59 newdogma sshd[28824]: Failed password for invalid user ody from 200.160.121.97 port 32164 ssh2
Feb 10 13:20:59 newdogma sshd[28824]: Received disconnect from 200.160.121.97 port 32164:11: Bye Bye [pre........
-------------------------------
2020-02-16 05:50:30
95.116.215.26 attackspam
fire
2020-02-16 05:30:11
190.210.250.86 attackbots
Feb 10 11:20:43 cumulus sshd[24634]: Invalid user efe from 190.210.250.86 port 41539
Feb 10 11:20:43 cumulus sshd[24634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.210.250.86
Feb 10 11:20:45 cumulus sshd[24634]: Failed password for invalid user efe from 190.210.250.86 port 41539 ssh2
Feb 10 11:20:45 cumulus sshd[24634]: Received disconnect from 190.210.250.86 port 41539:11: Bye Bye [preauth]
Feb 10 11:20:45 cumulus sshd[24634]: Disconnected from 190.210.250.86 port 41539 [preauth]
Feb 10 11:35:03 cumulus sshd[25020]: Invalid user xdc from 190.210.250.86 port 13981
Feb 10 11:35:03 cumulus sshd[25020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.210.250.86
Feb 10 11:35:05 cumulus sshd[25020]: Failed password for invalid user xdc from 190.210.250.86 port 13981 ssh2
Feb 10 11:35:05 cumulus sshd[25020]: Received disconnect from 190.210.250.86 port 13981:11: Bye Bye [preauth]
Feb........
-------------------------------
2020-02-16 05:44:13
210.56.28.219 attackbotsspam
Dec 16 01:18:22 ms-srv sshd[21670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.56.28.219
Dec 16 01:18:23 ms-srv sshd[21670]: Failed password for invalid user wisland from 210.56.28.219 port 52232 ssh2
2020-02-16 05:47:25
58.58.7.106 attackbotsspam
Fail2Ban Ban Triggered
2020-02-16 05:43:30

Recently Reported IPs

137.226.4.85 96.244.96.61 5.167.66.141 5.167.66.136
45.89.183.73 138.99.22.115 5.159.114.157 106.104.36.18
188.114.96.228 77.111.247.251 178.124.214.160 167.172.35.174
42.180.225.145 84.204.195.22 183.82.110.172 95.56.204.133
5.68.65.164 5.70.64.152 43.156.123.128 137.226.22.125