Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 73.139.61.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51131
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;73.139.61.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 07:27:52 CST 2025
;; MSG SIZE  rcvd: 106
Host info
242.61.139.73.in-addr.arpa domain name pointer c-73-139-61-242.hsd1.fl.comcast.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.61.139.73.in-addr.arpa	name = c-73-139-61-242.hsd1.fl.comcast.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
194.78.209.106 attackspam
Honeypot attack, port: 81, PTR: PTR record not found
2020-05-11 04:38:45
59.126.139.146 attack
Honeypot attack, port: 81, PTR: 59-126-139-146.HINET-IP.hinet.net.
2020-05-11 04:27:35
62.234.167.126 attackspambots
2020-05-10T22:32:36.113249amanda2.illicoweb.com sshd\[25682\]: Invalid user rizal from 62.234.167.126 port 21364
2020-05-10T22:32:36.118349amanda2.illicoweb.com sshd\[25682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.167.126
2020-05-10T22:32:37.940291amanda2.illicoweb.com sshd\[25682\]: Failed password for invalid user rizal from 62.234.167.126 port 21364 ssh2
2020-05-10T22:36:41.226809amanda2.illicoweb.com sshd\[26084\]: Invalid user fx from 62.234.167.126 port 19190
2020-05-10T22:36:41.232079amanda2.illicoweb.com sshd\[26084\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.167.126
...
2020-05-11 04:59:19
95.218.250.9 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-05-11 04:28:45
36.67.248.206 attackbots
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-05-11 04:43:33
198.199.83.174 attackspambots
May 10 17:34:38 ws12vmsma01 sshd[62525]: Invalid user web from 198.199.83.174
May 10 17:34:40 ws12vmsma01 sshd[62525]: Failed password for invalid user web from 198.199.83.174 port 60260 ssh2
May 10 17:39:24 ws12vmsma01 sshd[63241]: Invalid user adi from 198.199.83.174
...
2020-05-11 05:02:16
111.229.179.62 attackspambots
May 10 22:23:03 roki sshd[19048]: Invalid user orlando from 111.229.179.62
May 10 22:23:03 roki sshd[19048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.179.62
May 10 22:23:05 roki sshd[19048]: Failed password for invalid user orlando from 111.229.179.62 port 58516 ssh2
May 10 22:42:02 roki sshd[20364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.179.62  user=root
May 10 22:42:04 roki sshd[20364]: Failed password for root from 111.229.179.62 port 33204 ssh2
...
2020-05-11 04:46:20
118.173.113.143 attackspam
9001/tcp
[2020-05-10]1pkt
2020-05-11 04:43:13
222.186.30.35 attackspam
May 10 22:55:00 host sshd[30661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.35  user=root
May 10 22:55:03 host sshd[30661]: Failed password for root from 222.186.30.35 port 16057 ssh2
...
2020-05-11 05:00:28
39.45.159.208 attackbotsspam
445/tcp 445/tcp
[2020-05-10]2pkt
2020-05-11 04:51:13
177.129.8.138 attack
445/tcp
[2020-05-10]1pkt
2020-05-11 04:56:23
177.207.226.36 attack
Honeypot attack, port: 81, PTR: 177.207.226.36.dynamic.adsl.gvt.net.br.
2020-05-11 04:35:24
103.235.224.77 attackbotsspam
May 10 22:29:10 srv-ubuntu-dev3 sshd[18617]: Invalid user test from 103.235.224.77
May 10 22:29:10 srv-ubuntu-dev3 sshd[18617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.235.224.77
May 10 22:29:10 srv-ubuntu-dev3 sshd[18617]: Invalid user test from 103.235.224.77
May 10 22:29:12 srv-ubuntu-dev3 sshd[18617]: Failed password for invalid user test from 103.235.224.77 port 51859 ssh2
May 10 22:33:47 srv-ubuntu-dev3 sshd[19359]: Invalid user tsbot from 103.235.224.77
May 10 22:33:47 srv-ubuntu-dev3 sshd[19359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.235.224.77
May 10 22:33:47 srv-ubuntu-dev3 sshd[19359]: Invalid user tsbot from 103.235.224.77
May 10 22:33:50 srv-ubuntu-dev3 sshd[19359]: Failed password for invalid user tsbot from 103.235.224.77 port 47620 ssh2
May 10 22:36:52 srv-ubuntu-dev3 sshd[19882]: Invalid user test04 from 103.235.224.77
...
2020-05-11 04:44:34
54.38.52.78 attackspam
May 10 14:33:05 server1 sshd\[6181\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.52.78 
May 10 14:33:07 server1 sshd\[6181\]: Failed password for invalid user hoster from 54.38.52.78 port 42990 ssh2
May 10 14:36:41 server1 sshd\[7728\]: Invalid user fctr from 54.38.52.78
May 10 14:36:41 server1 sshd\[7728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.52.78 
May 10 14:36:44 server1 sshd\[7728\]: Failed password for invalid user fctr from 54.38.52.78 port 50694 ssh2
...
2020-05-11 04:52:04
103.81.156.8 attack
Triggered by Fail2Ban at Ares web server
2020-05-11 05:01:33

Recently Reported IPs

124.220.57.120 210.106.123.180 138.126.77.180 182.137.220.194
3.102.217.120 53.164.99.73 78.206.48.176 147.125.11.64
32.197.38.132 52.37.49.37 127.110.227.173 170.117.190.188
205.122.89.144 191.167.114.2 234.228.154.219 193.136.116.161
203.104.38.43 219.60.159.97 61.215.99.94 209.94.110.254