Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 74.24.221.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31991
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;74.24.221.139.			IN	A

;; AUTHORITY SECTION:
.			314	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011002 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 10:45:56 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 139.221.24.74.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.221.24.74.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
54.39.104.201 attackbots
Port scan on 3 port(s): 4085 5095 8060
2020-04-27 07:26:12
195.181.168.138 attack
[2020-04-26 18:52:23] NOTICE[1170] chan_sip.c: Registration from '' failed for '195.181.168.138:52134' - Wrong password
[2020-04-26 18:52:23] SECURITY[1184] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-04-26T18:52:23.150-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="74",SessionID="0x7f6c0825a1d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/195.181.168.138/52134",Challenge="62cefef2",ReceivedChallenge="62cefef2",ReceivedHash="cc26bc589129f36ead208af38440a78e"
[2020-04-26 18:52:37] NOTICE[1170] chan_sip.c: Registration from '' failed for '195.181.168.138:60014' - Wrong password
[2020-04-26 18:52:37] SECURITY[1184] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-04-26T18:52:37.864-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="173",SessionID="0x7f6c086f7488",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/195.181.168.1
...
2020-04-27 07:05:01
124.226.213.129 attack
2020-04-26T20:33:34.360549dmca.cloudsearch.cf sshd[21990]: Invalid user natural from 124.226.213.129 port 34006
2020-04-26T20:33:34.367691dmca.cloudsearch.cf sshd[21990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.226.213.129
2020-04-26T20:33:34.360549dmca.cloudsearch.cf sshd[21990]: Invalid user natural from 124.226.213.129 port 34006
2020-04-26T20:33:36.473389dmca.cloudsearch.cf sshd[21990]: Failed password for invalid user natural from 124.226.213.129 port 34006 ssh2
2020-04-26T20:37:47.005258dmca.cloudsearch.cf sshd[22298]: Invalid user laci from 124.226.213.129 port 56013
2020-04-26T20:37:47.010976dmca.cloudsearch.cf sshd[22298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.226.213.129
2020-04-26T20:37:47.005258dmca.cloudsearch.cf sshd[22298]: Invalid user laci from 124.226.213.129 port 56013
2020-04-26T20:37:49.181861dmca.cloudsearch.cf sshd[22298]: Failed password for invalid user lac
...
2020-04-27 07:07:13
201.6.154.155 attackspam
Apr 26 23:29:06 vps647732 sshd[22721]: Failed password for root from 201.6.154.155 port 49498 ssh2
...
2020-04-27 07:11:27
51.89.136.104 attackbots
Apr 26 17:18:04 ny01 sshd[18191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.136.104
Apr 26 17:18:06 ny01 sshd[18191]: Failed password for invalid user linux1 from 51.89.136.104 port 57758 ssh2
Apr 26 17:22:41 ny01 sshd[18826]: Failed password for root from 51.89.136.104 port 36594 ssh2
2020-04-27 07:12:01
111.231.225.162 attackspam
Apr 27 01:16:54 vps647732 sshd[26085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.225.162
Apr 27 01:16:56 vps647732 sshd[26085]: Failed password for invalid user liwei from 111.231.225.162 port 56356 ssh2
...
2020-04-27 07:18:54
36.111.182.36 attackspambots
Apr 26 18:52:48 ny01 sshd[31959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.111.182.36
Apr 26 18:52:51 ny01 sshd[31959]: Failed password for invalid user admin from 36.111.182.36 port 34734 ssh2
Apr 26 18:56:43 ny01 sshd[319]: Failed password for root from 36.111.182.36 port 56296 ssh2
2020-04-27 06:57:25
1.236.151.31 attackspambots
Apr 27 04:05:56 webhost01 sshd[671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.236.151.31
Apr 27 04:05:58 webhost01 sshd[671]: Failed password for invalid user usuario1 from 1.236.151.31 port 40584 ssh2
...
2020-04-27 07:19:26
121.229.2.136 attack
Apr 27 04:15:48 gw1 sshd[19517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.229.2.136
Apr 27 04:15:50 gw1 sshd[19517]: Failed password for invalid user Joshua from 121.229.2.136 port 54708 ssh2
...
2020-04-27 07:17:59
106.0.59.223 attack
Automatic report - Port Scan Attack
2020-04-27 06:51:07
151.80.140.166 attack
Apr 26 23:39:35 ns382633 sshd\[740\]: Invalid user jing from 151.80.140.166 port 60270
Apr 26 23:39:35 ns382633 sshd\[740\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.140.166
Apr 26 23:39:37 ns382633 sshd\[740\]: Failed password for invalid user jing from 151.80.140.166 port 60270 ssh2
Apr 27 00:02:31 ns382633 sshd\[6048\]: Invalid user alan from 151.80.140.166 port 46900
Apr 27 00:02:31 ns382633 sshd\[6048\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.140.166
2020-04-27 07:25:01
222.186.190.2 attackbots
Apr 27 00:36:27 * sshd[28737]: Failed password for root from 222.186.190.2 port 43492 ssh2
Apr 27 00:36:40 * sshd[28737]: error: maximum authentication attempts exceeded for root from 222.186.190.2 port 43492 ssh2 [preauth]
2020-04-27 06:49:39
104.225.219.138 attack
SASL PLAIN auth failed: ruser=...
2020-04-27 07:00:11
172.241.238.31 attackspam
REQUESTED PAGE: /
2020-04-27 07:04:35
222.186.30.112 attack
2020-04-27T00:48:59.327715sd-86998 sshd[19178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112  user=root
2020-04-27T00:49:01.853999sd-86998 sshd[19178]: Failed password for root from 222.186.30.112 port 37271 ssh2
2020-04-27T00:49:04.430393sd-86998 sshd[19178]: Failed password for root from 222.186.30.112 port 37271 ssh2
2020-04-27T00:48:59.327715sd-86998 sshd[19178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112  user=root
2020-04-27T00:49:01.853999sd-86998 sshd[19178]: Failed password for root from 222.186.30.112 port 37271 ssh2
2020-04-27T00:49:04.430393sd-86998 sshd[19178]: Failed password for root from 222.186.30.112 port 37271 ssh2
2020-04-27T00:48:59.327715sd-86998 sshd[19178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112  user=root
2020-04-27T00:49:01.853999sd-86998 sshd[19178]: Failed password for root from 
...
2020-04-27 06:53:21

Recently Reported IPs

143.101.55.196 171.168.59.169 76.220.158.216 27.79.111.13
32.200.8.76 54.229.253.253 178.45.192.156 23.208.95.199
18.207.171.110 30.63.240.84 24.77.149.205 45.83.246.53
27.37.156.129 44.38.205.191 25.77.46.182 117.118.230.156
170.126.9.192 215.177.114.129 170.219.42.176 3.89.166.203