Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Reno

Region: Nevada

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Charter Communications

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 71.94.27.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12953
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;71.94.27.139.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051600 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu May 16 20:11:45 CST 2019
;; MSG SIZE  rcvd: 116

Host info
139.27.94.71.in-addr.arpa domain name pointer 71-94-27-139.dhcp.reno.nv.charter.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
139.27.94.71.in-addr.arpa	name = 71-94-27-139.dhcp.reno.nv.charter.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
182.253.207.188 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 10-10-2019 12:55:18.
2019-10-10 23:21:40
92.118.38.37 attack
Oct 10 11:58:26 web1 postfix/smtpd[22043]: warning: unknown[92.118.38.37]: SASL LOGIN authentication failed: authentication failure
...
2019-10-11 00:00:34
179.33.137.117 attack
Oct 10 13:54:37 DAAP sshd[8976]: Invalid user 123Bud from 179.33.137.117 port 56370
...
2019-10-10 23:50:23
177.106.80.133 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 10-10-2019 12:55:18.
2019-10-10 23:22:05
41.45.129.43 attack
port scan and connect, tcp 1433 (ms-sql-s)
2019-10-10 23:29:47
175.126.176.21 attack
Automatic report - Banned IP Access
2019-10-10 23:51:26
36.65.124.47 attack
SSH invalid-user multiple login try
2019-10-10 23:16:17
144.217.72.200 attack
Automatic report - XMLRPC Attack
2019-10-10 23:59:19
118.68.129.225 attack
port scan and connect, tcp 23 (telnet)
2019-10-10 23:47:09
222.186.169.194 attackspambots
Oct 10 17:43:35 MK-Soft-Root1 sshd[10402]: Failed password for root from 222.186.169.194 port 9640 ssh2
Oct 10 17:43:41 MK-Soft-Root1 sshd[10402]: Failed password for root from 222.186.169.194 port 9640 ssh2
...
2019-10-10 23:56:23
138.117.108.88 attackbotsspam
Oct 10 14:39:48 localhost sshd\[3017\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.117.108.88  user=root
Oct 10 14:39:50 localhost sshd\[3017\]: Failed password for root from 138.117.108.88 port 33651 ssh2
Oct 10 14:47:09 localhost sshd\[3258\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.117.108.88  user=root
Oct 10 14:47:10 localhost sshd\[3258\]: Failed password for root from 138.117.108.88 port 53144 ssh2
Oct 10 14:54:18 localhost sshd\[3491\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.117.108.88  user=root
...
2019-10-10 23:17:41
185.216.140.180 attack
10/10/2019-16:59:51.835941 185.216.140.180 Protocol: 6 ET SCAN Suspicious inbound to mySQL port 3306
2019-10-10 23:16:48
62.210.151.21 attack
\[2019-10-10 11:52:35\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-10T11:52:35.203-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0013054404227",SessionID="0x7fc3acce0728",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.151.21/56777",ACLName="no_extension_match"
\[2019-10-10 11:52:51\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-10T11:52:51.496-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00013054404227",SessionID="0x7fc3ac7a3b58",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.151.21/63570",ACLName="no_extension_match"
\[2019-10-10 11:53:11\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-10T11:53:11.006-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="01113054404227",SessionID="0x7fc3acce0728",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.151.21/56237",ACLName="no_extensi
2019-10-10 23:56:45
77.247.109.72 attackspam
\[2019-10-10 11:40:15\] NOTICE\[1887\] chan_sip.c: Registration from '"4600" \' failed for '77.247.109.72:5501' - Wrong password
\[2019-10-10 11:40:15\] SECURITY\[1898\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-10-10T11:40:15.559-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="4600",SessionID="0x7fc3acc3d768",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.109.72/5501",Challenge="4689108a",ReceivedChallenge="4689108a",ReceivedHash="f39a0fa540f6de02485e7fabd358f32d"
\[2019-10-10 11:40:15\] NOTICE\[1887\] chan_sip.c: Registration from '"4600" \' failed for '77.247.109.72:5501' - Wrong password
\[2019-10-10 11:40:15\] SECURITY\[1898\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-10-10T11:40:15.655-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="4600",SessionID="0x7fc3ac636978",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UD
2019-10-11 00:01:30
221.217.55.224 attackbots
Oct  9 22:47:17 localhost kernel: [4413457.211218] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=221.217.55.224 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=50 ID=65322 PROTO=TCP SPT=49816 DPT=52869 WINDOW=14448 RES=0x00 SYN URGP=0 
Oct  9 22:47:17 localhost kernel: [4413457.211248] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=221.217.55.224 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=50 ID=65322 PROTO=TCP SPT=49816 DPT=52869 SEQ=758669438 ACK=0 WINDOW=14448 RES=0x00 SYN URGP=0 
Oct 10 07:55:16 localhost kernel: [4446336.021528] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=221.217.55.224 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=50 ID=38354 PROTO=TCP SPT=55387 DPT=52869 WINDOW=14448 RES=0x00 SYN URGP=0 
Oct 10 07:55:16 localhost kernel: [4446336.021561] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=221.217.55.224 DST=[mungedIP2] LEN=40 TOS=0x0
2019-10-10 23:25:38

Recently Reported IPs

208.184.96.126 149.56.200.74 42.248.173.160 69.141.139.229
50.3.88.120 168.53.157.120 46.53.15.121 15.143.20.154
151.36.94.118 204.203.45.236 148.153.24.106 143.69.8.170
3.14.69.221 126.103.63.69 197.23.107.19 62.24.109.26
98.101.148.213 114.48.99.43 171.226.130.138 191.124.19.217