Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Knoxville

Region: Iowa

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 71.7.57.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50875
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;71.7.57.139.			IN	A

;; AUTHORITY SECTION:
.			531	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019111901 1800 900 604800 86400

;; Query time: 722 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Nov 20 02:54:32 CST 2019
;; MSG SIZE  rcvd: 115
Host info
139.57.7.71.in-addr.arpa domain name pointer knvl-01-2443.dsl.iowatelecom.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.57.7.71.in-addr.arpa	name = knvl-01-2443.dsl.iowatelecom.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.176.27.6 attackbots
Dec 20 21:50:45 debian-2gb-nbg1-2 kernel: \[527806.130338\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.6 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=21407 PROTO=TCP SPT=58822 DPT=724 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-21 05:12:32
52.156.48.67 attack
I've discovered this unresolved address in the wireshark capture of my network's activity i've just made ! I'm located in St Etienne, France, I suspect people with a powerline kit Atheros to hack my connexion and PC. I've captured their MAC Address as well and I've tried to signal this intrusion to the authorities in my town but I wonder if they really know anything about computers. I don't know a lot of things but I'm sure these intruders are at proximity since I detect them with Wireless Network Watcher even without any Internet access.
2019-12-21 05:24:10
123.27.124.139 attackspam
Brute force attempt
2019-12-21 05:31:42
58.254.132.239 attackbots
Dec 20 09:18:36 php1 sshd\[14736\]: Invalid user iiiiiii from 58.254.132.239
Dec 20 09:18:36 php1 sshd\[14736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.254.132.239
Dec 20 09:18:38 php1 sshd\[14736\]: Failed password for invalid user iiiiiii from 58.254.132.239 port 24575 ssh2
Dec 20 09:22:10 php1 sshd\[15103\]: Invalid user lovelace from 58.254.132.239
Dec 20 09:22:10 php1 sshd\[15103\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.254.132.239
2019-12-21 05:39:27
103.113.26.2 attackbots
Unauthorized connection attempt detected from IP address 103.113.26.2 to port 445
2019-12-21 05:38:34
177.99.67.104 attackbots
Automatic report - Port Scan Attack
2019-12-21 05:39:00
35.238.162.217 attackbotsspam
Dec 20 22:31:43 meumeu sshd[15413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.238.162.217 
Dec 20 22:31:45 meumeu sshd[15413]: Failed password for invalid user omtvedt from 35.238.162.217 port 54976 ssh2
Dec 20 22:36:31 meumeu sshd[16140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.238.162.217 
...
2019-12-21 05:38:00
195.8.51.139 attackbots
Unauthorized connection attempt detected from IP address 195.8.51.139 to port 445
2019-12-21 05:26:46
217.7.251.206 attackspambots
Dec 20 21:37:05 * sshd[21438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.7.251.206
Dec 20 21:37:07 * sshd[21438]: Failed password for invalid user test from 217.7.251.206 port 27792 ssh2
2019-12-21 05:11:22
193.112.123.100 attackspam
Dec 20 15:41:52 markkoudstaal sshd[10563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.123.100
Dec 20 15:41:53 markkoudstaal sshd[10563]: Failed password for invalid user mariland from 193.112.123.100 port 34194 ssh2
Dec 20 15:48:47 markkoudstaal sshd[11239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.123.100
2019-12-21 05:10:21
40.92.41.102 attackspambots
Dec 20 17:48:39 debian-2gb-vpn-nbg1-1 kernel: [1231678.183366] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.41.102 DST=78.46.192.101 LEN=52 TOS=0x02 PREC=0x00 TTL=104 ID=12536 DF PROTO=TCP SPT=6409 DPT=25 WINDOW=8192 RES=0x00 CWR ECE SYN URGP=0
2019-12-21 05:14:33
221.130.29.210 attackbots
Dec 20 12:27:01 aragorn sshd[22154]: Invalid user a from 221.130.29.210
Dec 20 12:27:02 aragorn sshd[22152]: Invalid user a from 221.130.29.210
Dec 20 12:27:03 aragorn sshd[22155]: Invalid user a from 221.130.29.210
Dec 20 12:27:03 aragorn sshd[22153]: Invalid user a from 221.130.29.210
...
2019-12-21 05:07:28
40.92.41.28 attack
Dec 20 17:48:52 debian-2gb-vpn-nbg1-1 kernel: [1231691.682901] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.41.28 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=232 ID=64527 DF PROTO=TCP SPT=51649 DPT=25 WINDOW=0 RES=0x00 ACK RST URGP=0
2019-12-21 05:06:17
222.186.190.92 attackspambots
Dec 20 21:40:55 game-panel sshd[13579]: Failed password for root from 222.186.190.92 port 21340 ssh2
Dec 20 21:41:04 game-panel sshd[13579]: Failed password for root from 222.186.190.92 port 21340 ssh2
Dec 20 21:41:07 game-panel sshd[13579]: Failed password for root from 222.186.190.92 port 21340 ssh2
Dec 20 21:41:07 game-panel sshd[13579]: error: maximum authentication attempts exceeded for root from 222.186.190.92 port 21340 ssh2 [preauth]
2019-12-21 05:42:17
167.114.226.137 attackspam
Oct 24 23:46:15 vtv3 sshd[28666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.226.137  user=root
Oct 24 23:57:26 vtv3 sshd[1757]: Invalid user com from 167.114.226.137 port 38897
Oct 24 23:57:26 vtv3 sshd[1757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.226.137
Oct 24 23:57:28 vtv3 sshd[1757]: Failed password for invalid user com from 167.114.226.137 port 38897 ssh2
Oct 25 00:01:12 vtv3 sshd[3900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.226.137  user=root
Oct 25 00:01:15 vtv3 sshd[3900]: Failed password for root from 167.114.226.137 port 45828 ssh2
Oct 25 00:12:18 vtv3 sshd[9466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.226.137  user=root
Oct 25 00:12:20 vtv3 sshd[9466]: Failed password for root from 167.114.226.137 port 34252 ssh2
Oct 25 00:16:08 vtv3 sshd[11481]: pam_unix(sshd:auth): authenti
2019-12-21 05:37:06

Recently Reported IPs

204.253.91.124 212.64.114.254 165.230.147.74 107.36.13.135
134.74.118.16 95.181.211.236 204.184.82.94 186.198.78.98
104.188.141.217 52.23.151.50 173.35.68.62 99.149.154.124
70.209.106.102 70.134.47.39 70.129.165.222 179.85.153.153
102.241.206.225 31.208.192.184 128.110.244.30 167.71.161.253