Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Denmark

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 62.107.54.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34059
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;62.107.54.239.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031401 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 15 04:28:45 CST 2025
;; MSG SIZE  rcvd: 106
Host info
239.54.107.62.in-addr.arpa domain name pointer 62-107-54-239.norlyscustomer.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
239.54.107.62.in-addr.arpa	name = 62-107-54-239.norlyscustomer.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
192.241.195.168 attackspam
Unauthorized connection attempt from IP address 192.241.195.168
2020-03-27 18:10:27
209.159.144.250 attackspambots
" "
2020-03-27 18:00:21
163.121.146.140 attackspambots
Unauthorised access (Mar 27) SRC=163.121.146.140 LEN=52 TTL=113 ID=23027 DF TCP DPT=445 WINDOW=8192 SYN
2020-03-27 17:32:03
87.251.74.8 attackspambots
firewall-block, port(s): 161/tcp, 291/tcp, 656/tcp
2020-03-27 17:51:00
185.98.87.120 attackspam
11 packets to ports 3000 3396 3398 4389 4489 6000 10000 10010 12345 33893 33894
2020-03-27 17:38:59
164.132.73.220 attack
firewall-block, port(s): 16000/tcp
2020-03-27 17:41:05
194.26.29.129 attackbots
Fail2Ban Ban Triggered
2020-03-27 18:04:35
87.251.74.9 attackbots
firewall-block, port(s): 3445/tcp, 3575/tcp, 3679/tcp, 3699/tcp, 3832/tcp, 3969/tcp
2020-03-27 17:50:47
194.26.29.120 attackbotsspam
176 packets to ports 4001 4005 4006 4015 4017 4018 4032 4038 4042 4044 4048 4049 4055 4060 4061 4068 4074 4076 4083 4084 4087 4090 4091 4099 4118 4121 4131 4143 4146 4156 4157 4159 4171 4181 4183 4185 4193 4197 4206 4214 4220 4223 4231 4237 4248 4253 4260 4262, etc.
2020-03-27 17:33:04
71.6.232.2 attack
SIP/5060 Probe, BF, Hack -
2020-03-27 18:33:43
192.241.238.152 attackbots
[portscan] tcp/22 [SSH]
*(RWIN=65535)(03271028)
2020-03-27 18:08:26
45.143.220.33 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-27 17:56:15
162.243.132.26 attackbots
Unauthorized connection attempt detected from IP address 162.243.132.26 to port 5094 [T]
2020-03-27 18:19:43
80.82.64.73 attack
scans 16 times in preceeding hours on the ports (in chronological order) 37689 39189 39389 37889 37289 41189 43089 41989 43089 43689 41689 41989 43289 40689 41589 41789 resulting in total of 133 scans from 80.82.64.0/20 block.
2020-03-27 18:32:19
213.136.73.44 attackbots
" "
2020-03-27 17:32:25

Recently Reported IPs

41.102.76.18 123.223.54.181 32.213.181.104 69.113.162.27
39.133.252.241 141.26.75.166 109.39.120.157 59.199.88.170
142.64.133.59 73.154.89.13 97.42.0.173 61.72.149.1
65.221.200.66 135.164.76.70 146.59.236.176 17.149.145.134
184.76.105.195 84.222.229.181 140.99.171.161 229.72.78.120