Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Dallas

Region: Texas

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 72.54.23.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6667
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;72.54.23.139.			IN	A

;; AUTHORITY SECTION:
.			555	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019122001 1800 900 604800 86400

;; Query time: 103 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 21 04:18:46 CST 2019
;; MSG SIZE  rcvd: 116
Host info
139.23.54.72.in-addr.arpa domain name pointer mail.imsmedicare.com.
139.23.54.72.in-addr.arpa domain name pointer mail.imedicaresolutions.com.
139.23.54.72.in-addr.arpa domain name pointer mail.imsmedco.com.
139.23.54.72.in-addr.arpa domain name pointer mail.imsfmo.com.
139.23.54.72.in-addr.arpa domain name pointer 72-54-23-139.customerip.birch.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.23.54.72.in-addr.arpa	name = mail.imedicaresolutions.com.
139.23.54.72.in-addr.arpa	name = mail.imsmedicare.com.
139.23.54.72.in-addr.arpa	name = mail.imsmedco.com.
139.23.54.72.in-addr.arpa	name = mail.imsfmo.com.
139.23.54.72.in-addr.arpa	name = 72-54-23-139.customerip.birch.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
78.187.193.74 attackspam
Honeypot attack, port: 23, PTR: 78.187.193.74.dynamic.ttnet.com.tr.
2019-08-03 02:12:51
46.101.101.66 attack
" "
2019-08-03 02:17:53
187.87.9.227 attackspam
Aug  2 03:38:31 mailman postfix/smtpd[28670]: warning: unknown[187.87.9.227]: SASL PLAIN authentication failed: authentication failure
2019-08-03 02:07:13
45.173.104.18 attack
Unauthorized connection attempt from IP address 45.173.104.18 on Port 445(SMB)
2019-08-03 02:51:34
176.194.129.196 attackbots
Honeypot attack, port: 445, PTR: ip-176-194-129-196.bb.netbynet.ru.
2019-08-03 01:54:57
77.247.110.248 attackspam
" "
2019-08-03 02:55:01
193.176.86.174 attack
[portscan] Port scan
2019-08-03 02:04:19
213.32.21.139 attackspambots
Aug  2 14:09:28 vmd17057 sshd\[4766\]: Invalid user ionut from 213.32.21.139 port 44960
Aug  2 14:09:28 vmd17057 sshd\[4766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.21.139
Aug  2 14:09:30 vmd17057 sshd\[4766\]: Failed password for invalid user ionut from 213.32.21.139 port 44960 ssh2
...
2019-08-03 01:52:36
188.143.5.195 attackspam
Honeypot attack, port: 23, PTR: 188-143-5-195.pool.digikabel.hu.
2019-08-03 02:13:51
159.65.6.57 attackbotsspam
Invalid user stacy from 159.65.6.57 port 36762
2019-08-03 02:09:56
49.151.3.4 attackbotsspam
Unauthorized connection attempt from IP address 49.151.3.4 on Port 445(SMB)
2019-08-03 02:53:52
117.211.169.174 attackspam
Unauthorized connection attempt from IP address 117.211.169.174 on Port 445(SMB)
2019-08-03 02:41:00
59.98.98.87 attack
Automatic report - Port Scan Attack
2019-08-03 02:39:07
119.28.222.11 attackbotsspam
2019-08-02T09:08:38.248697abusebot-7.cloudsearch.cf sshd\[10141\]: Invalid user ada from 119.28.222.11 port 41840
2019-08-03 02:06:02
118.174.122.137 attackbots
Unauthorised access (Aug  2) SRC=118.174.122.137 LEN=60 TTL=51 ID=19638 DF TCP DPT=445 WINDOW=8192 SYN
2019-08-03 02:26:28

Recently Reported IPs

97.187.62.36 63.224.195.52 191.186.236.96 3.127.246.149
106.32.75.210 178.165.30.1 110.176.137.176 190.244.254.140
121.137.73.118 34.255.175.13 59.54.2.63 176.246.148.191
85.63.43.16 52.237.157.65 125.164.50.3 128.231.57.180
99.247.104.117 60.188.112.56 40.92.9.103 174.237.101.219