Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Huntersville

Region: North Carolina

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 75.190.204.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28609
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;75.190.204.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030601 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 07 13:39:57 CST 2025
;; MSG SIZE  rcvd: 107
Host info
139.204.190.75.in-addr.arpa domain name pointer syn-075-190-204-139.res.spectrum.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.204.190.75.in-addr.arpa	name = syn-075-190-204-139.res.spectrum.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
128.199.165.53 attackspambots
SSH Invalid Login
2020-04-19 06:32:34
61.91.221.51 attack
ICMP MH Probe, Scan /Distributed -
2020-04-19 06:10:09
146.247.147.141 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-19 06:32:20
82.148.30.174 attackspambots
Apr 18 23:39:27 vps647732 sshd[28477]: Failed password for root from 82.148.30.174 port 48558 ssh2
...
2020-04-19 06:39:26
144.34.216.179 attackspam
Apr 19 02:26:16 gw1 sshd[14327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.34.216.179
Apr 19 02:26:18 gw1 sshd[14327]: Failed password for invalid user admin from 144.34.216.179 port 59020 ssh2
...
2020-04-19 06:40:10
201.156.169.109 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-19 06:13:54
45.55.128.109 attack
Apr 19 00:25:08 nextcloud sshd\[8582\]: Invalid user ls from 45.55.128.109
Apr 19 00:25:08 nextcloud sshd\[8582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.128.109
Apr 19 00:25:10 nextcloud sshd\[8582\]: Failed password for invalid user ls from 45.55.128.109 port 57206 ssh2
2020-04-19 06:38:12
144.217.42.212 attackspambots
Invalid user wnak from 144.217.42.212 port 41140
2020-04-19 06:15:21
116.179.145.103 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-19 06:46:00
162.243.133.64 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-04-19 06:30:20
107.155.5.42 attackbots
ICMP MH Probe, Scan /Distributed -
2020-04-19 06:24:41
189.39.112.94 attack
Invalid user ubuntu from 189.39.112.94 port 55210
2020-04-19 06:29:57
51.178.53.238 attackbots
(sshd) Failed SSH login from 51.178.53.238 (FR/France/238.ip-51-178-53.eu): 5 in the last 3600 secs
2020-04-19 06:42:22
218.92.0.192 attackspambots
Apr 19 00:14:28 legacy sshd[16054]: Failed password for root from 218.92.0.192 port 55859 ssh2
Apr 19 00:15:28 legacy sshd[16076]: Failed password for root from 218.92.0.192 port 14955 ssh2
...
2020-04-19 06:20:53
186.10.125.209 attackspam
Invalid user edu from 186.10.125.209 port 15204
2020-04-19 06:34:05

Recently Reported IPs

155.22.76.200 97.242.241.44 114.244.95.167 107.171.133.28
188.123.245.218 196.62.59.123 152.22.160.22 48.153.135.116
208.138.217.63 239.89.71.47 81.141.115.48 5.124.81.244
14.37.8.209 96.224.200.231 73.132.63.33 148.2.161.109
232.236.202.21 232.11.173.128 74.117.134.78 235.95.157.129