Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Portsmouth

Region: England

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.71.52.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45354
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.71.52.139.			IN	A

;; AUTHORITY SECTION:
.			571	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062301 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 24 07:58:01 CST 2022
;; MSG SIZE  rcvd: 104
Host info
139.52.71.5.in-addr.arpa domain name pointer 0547348b.skybroadband.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.52.71.5.in-addr.arpa	name = 0547348b.skybroadband.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
149.56.129.68 attack
Invalid user developer from 149.56.129.68 port 50360
2020-08-28 13:28:31
14.215.116.6 attackspambots
Invalid user eps from 14.215.116.6 port 54145
2020-08-28 13:11:24
142.93.195.249 attackbots
Aug 25 08:43:37 v26 sshd[21112]: Did not receive identification string from 142.93.195.249 port 51152
Aug 25 09:05:45 v26 sshd[24195]: Did not receive identification string from 142.93.195.249 port 53628
Aug 25 12:02:40 v26 sshd[16004]: Did not receive identification string from 142.93.195.249 port 44500
Aug 25 16:52:45 v26 sshd[3948]: Did not receive identification string from 142.93.195.249 port 58940
Aug 25 20:45:55 v26 sshd[7588]: Did not receive identification string from 142.93.195.249 port 37214
Aug 26 00:46:23 v26 sshd[13612]: Did not receive identification string from 142.93.195.249 port 52830
Aug 26 09:37:09 v26 sshd[2926]: Did not receive identification string from 142.93.195.249 port 51042
Aug 27 07:02:46 v26 sshd[27176]: Did not receive identification string from 142.93.195.249 port 53350
Aug 27 07:03:04 v26 sshd[27211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.195.249  user=r.r
Aug 27 07:03:06 v26 sshd[........
-------------------------------
2020-08-28 13:23:42
185.63.253.200 spambotsattackproxynormal
I
2020-08-28 13:23:35
166.175.189.255 attack
Brute forcing email accounts
2020-08-28 13:35:35
143.255.243.119 attackspam
Automatic report - Port Scan Attack
2020-08-28 13:38:52
80.82.78.82 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 68 - port: 4067 proto: tcp cat: Misc Attackbytes: 60
2020-08-28 13:14:58
210.195.154.146 attackspam
Unauthorised access (Aug 28) SRC=210.195.154.146 LEN=44 TTL=55 ID=48623 TCP DPT=8080 WINDOW=8403 SYN 
Unauthorised access (Aug 28) SRC=210.195.154.146 LEN=44 TTL=55 ID=39872 TCP DPT=8080 WINDOW=30936 SYN
2020-08-28 13:39:39
212.170.50.203 attack
Invalid user lhz from 212.170.50.203 port 46754
2020-08-28 13:10:22
45.55.36.216 attack
$f2bV_matches
2020-08-28 13:09:24
181.189.144.206 attack
ssh brute force
2020-08-28 13:47:43
23.106.159.187 attack
Invalid user lzg from 23.106.159.187 port 50885
2020-08-28 13:07:09
103.253.200.161 attack
Aug 28 01:00:26 ws24vmsma01 sshd[245204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.253.200.161
Aug 28 01:00:29 ws24vmsma01 sshd[245204]: Failed password for invalid user yjlee from 103.253.200.161 port 36480 ssh2
...
2020-08-28 13:26:38
106.124.142.206 attackbots
Aug 28 07:13:15 mellenthin sshd[28527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.142.206
Aug 28 07:13:18 mellenthin sshd[28527]: Failed password for invalid user git from 106.124.142.206 port 51180 ssh2
2020-08-28 13:25:52
123.206.90.149 attack
Invalid user qce from 123.206.90.149 port 61493
2020-08-28 13:36:48

Recently Reported IPs

137.226.4.85 96.244.96.61 5.167.66.141 5.167.66.136
45.89.183.73 138.99.22.115 5.159.114.157 106.104.36.18
188.114.96.228 77.111.247.251 178.124.214.160 167.172.35.174
42.180.225.145 84.204.195.22 183.82.110.172 95.56.204.133
5.68.65.164 5.70.64.152 43.156.123.128 137.226.22.125