Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom of Great Britain and Northern Ireland (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 86.139.72.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34473
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;86.139.72.22.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021002 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 06:43:49 CST 2025
;; MSG SIZE  rcvd: 105
Host info
22.72.139.86.in-addr.arpa domain name pointer host86-139-72-22.range86-139.btcentralplus.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
22.72.139.86.in-addr.arpa	name = host86-139-72-22.range86-139.btcentralplus.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
207.114.197.34 attackspam
Port Scan: UDP/137
2019-08-05 12:34:29
12.229.61.58 attackbotsspam
Port Scan: UDP/137
2019-08-05 12:33:18
77.40.27.96 attack
IP: 77.40.27.96
ASN: AS12389 Rostelecom
Port: Simple Mail Transfer 25
Found in one or more Blacklists
Date: 5/08/2019 5:04:30 AM UTC
2019-08-05 13:09:11
200.93.75.239 attack
Port Scan: TCP/23
2019-08-05 12:35:52
161.0.37.98 attackbotsspam
Port Scan: UDP/137
2019-08-05 12:40:14
46.45.143.35 attack
WordPress XMLRPC scan :: 46.45.143.35 0.952 BYPASS [05/Aug/2019:13:59:18  1000] [censored_1] "POST /xmlrpc.php HTTP/1.1" 503 19380 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-08-05 12:58:43
193.201.224.246 attack
Port Scan: TCP/443
2019-08-05 12:37:33
91.138.201.202 attackbotsspam
Autoban   91.138.201.202 AUTH/CONNECT
2019-08-05 13:18:32
12.217.195.34 attack
Port Scan: UDP/514
2019-08-05 12:51:05
70.29.106.63 attack
Aug  5 06:58:37 lnxded63 sshd[32208]: Failed password for root from 70.29.106.63 port 38048 ssh2
Aug  5 06:58:37 lnxded63 sshd[32208]: Failed password for root from 70.29.106.63 port 38048 ssh2
Aug  5 07:02:54 lnxded63 sshd[510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.29.106.63
2019-08-05 13:23:22
91.140.104.19 attack
Autoban   91.140.104.19 AUTH/CONNECT
2019-08-05 13:16:27
187.95.38.17 attackbots
email spam
2019-08-05 12:58:12
199.19.157.142 attack
Port Scan: TCP/445
2019-08-05 12:36:24
91.200.126.174 attackspam
Autoban   91.200.126.174 AUTH/CONNECT
2019-08-05 13:04:33
27.158.125.109 attackbots
Unauthorised access (Aug  5) SRC=27.158.125.109 LEN=40 TTL=241 ID=40320 DF TCP DPT=23 WINDOW=14600 SYN
2019-08-05 12:57:27

Recently Reported IPs

196.56.254.200 84.233.187.126 163.147.82.115 21.150.66.159
187.62.161.179 66.201.136.238 64.212.178.72 27.43.50.110
180.64.148.107 128.44.229.27 225.10.246.126 65.160.155.109
101.66.147.209 97.4.233.156 208.200.81.207 58.38.177.16
80.250.199.92 80.50.108.0 165.6.197.104 52.6.41.194