Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 95.252.194.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52881
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;95.252.194.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021501 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 05:11:06 CST 2025
;; MSG SIZE  rcvd: 107
Host info
139.194.252.95.in-addr.arpa domain name pointer host-95-252-194-139.retail.telecomitalia.it.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.194.252.95.in-addr.arpa	name = host-95-252-194-139.retail.telecomitalia.it.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.186.180.9 attackspambots
2019-10-05T05:05:57.888296abusebot.cloudsearch.cf sshd\[4073\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.9  user=root
2019-10-05 13:08:46
222.160.51.138 attackspambots
Unauthorised access (Oct  5) SRC=222.160.51.138 LEN=40 TTL=49 ID=51524 TCP DPT=8080 WINDOW=38099 SYN 
Unauthorised access (Oct  4) SRC=222.160.51.138 LEN=40 TTL=49 ID=34912 TCP DPT=8080 WINDOW=22372 SYN 
Unauthorised access (Oct  4) SRC=222.160.51.138 LEN=40 TTL=49 ID=61494 TCP DPT=8080 WINDOW=22372 SYN
2019-10-05 12:55:00
222.186.175.202 attack
Oct  5 06:52:09 [host] sshd[7023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202  user=root
Oct  5 06:52:11 [host] sshd[7023]: Failed password for root from 222.186.175.202 port 47852 ssh2
Oct  5 06:52:37 [host] sshd[7031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202  user=root
2019-10-05 13:02:50
60.172.95.182 attackbotsspam
10/05/2019-05:56:05.470549 60.172.95.182 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 59
2019-10-05 12:45:17
2.193.5.75 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-05 12:33:50
212.156.17.218 attackspam
Oct  5 06:51:31 site1 sshd\[55105\]: Address 212.156.17.218 maps to 212.156.17.218.static.turktelekom.com.tr, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Oct  5 06:51:31 site1 sshd\[55105\]: Invalid user P4rol41234 from 212.156.17.218Oct  5 06:51:33 site1 sshd\[55105\]: Failed password for invalid user P4rol41234 from 212.156.17.218 port 44046 ssh2Oct  5 06:56:01 site1 sshd\[55403\]: Address 212.156.17.218 maps to 212.156.17.218.static.turktelekom.com.tr, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Oct  5 06:56:01 site1 sshd\[55403\]: Invalid user xsw2zaq1 from 212.156.17.218Oct  5 06:56:03 site1 sshd\[55403\]: Failed password for invalid user xsw2zaq1 from 212.156.17.218 port 59548 ssh2
...
2019-10-05 12:46:04
138.186.1.26 attackspam
2019-10-05T04:43:05.256450shield sshd\[27027\]: Invalid user Hunter123 from 138.186.1.26 port 51775
2019-10-05T04:43:05.262857shield sshd\[27027\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=r-26.1-186-138.nrttelecom.com.br
2019-10-05T04:43:07.050718shield sshd\[27027\]: Failed password for invalid user Hunter123 from 138.186.1.26 port 51775 ssh2
2019-10-05T04:47:31.354186shield sshd\[27973\]: Invalid user Passwort@abc from 138.186.1.26 port 34964
2019-10-05T04:47:31.359008shield sshd\[27973\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=r-26.1-186-138.nrttelecom.com.br
2019-10-05 12:58:27
159.65.24.7 attackbotsspam
Oct  4 18:29:16 php1 sshd\[19289\]: Invalid user 123 from 159.65.24.7
Oct  4 18:29:16 php1 sshd\[19289\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.24.7
Oct  4 18:29:18 php1 sshd\[19289\]: Failed password for invalid user 123 from 159.65.24.7 port 33942 ssh2
Oct  4 18:33:30 php1 sshd\[19781\]: Invalid user Schule2017 from 159.65.24.7
Oct  4 18:33:30 php1 sshd\[19781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.24.7
2019-10-05 12:35:04
222.186.42.117 attackbotsspam
Oct  5 06:53:03 MK-Soft-VM6 sshd[5404]: Failed password for root from 222.186.42.117 port 15706 ssh2
Oct  5 06:53:07 MK-Soft-VM6 sshd[5404]: Failed password for root from 222.186.42.117 port 15706 ssh2
...
2019-10-05 13:01:11
34.68.49.65 attackspam
Oct  5 06:50:09 MK-Soft-Root2 sshd[15029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.68.49.65 
Oct  5 06:50:11 MK-Soft-Root2 sshd[15029]: Failed password for invalid user admin from 34.68.49.65 port 41154 ssh2
...
2019-10-05 13:09:41
115.78.232.152 attackbots
Oct  5 08:01:43 sauna sshd[155179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.78.232.152
Oct  5 08:01:45 sauna sshd[155179]: Failed password for invalid user Par0la1@ from 115.78.232.152 port 39844 ssh2
...
2019-10-05 13:10:04
128.199.223.220 attack
IMAP
2019-10-05 13:00:23
222.186.52.124 attackbots
Oct  5 07:00:34 MK-Soft-Root1 sshd[22846]: Failed password for root from 222.186.52.124 port 23324 ssh2
Oct  5 07:00:36 MK-Soft-Root1 sshd[22846]: Failed password for root from 222.186.52.124 port 23324 ssh2
...
2019-10-05 13:02:24
218.92.0.208 attackbots
2019-10-05T03:56:21.352862abusebot-7.cloudsearch.cf sshd\[23081\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.208  user=root
2019-10-05 12:32:33
5.135.101.228 attackspam
Oct  5 05:51:17 markkoudstaal sshd[24276]: Failed password for root from 5.135.101.228 port 34300 ssh2
Oct  5 05:55:00 markkoudstaal sshd[24561]: Failed password for root from 5.135.101.228 port 46896 ssh2
2019-10-05 12:40:58

Recently Reported IPs

82.227.91.76 106.99.171.234 81.64.168.128 22.73.186.35
59.110.168.253 242.32.67.246 179.183.242.59 18.225.184.163
130.226.76.90 184.71.174.25 39.41.27.34 150.56.91.219
236.216.23.125 66.246.168.249 198.99.3.184 211.224.23.97
76.65.202.179 13.37.187.196 91.112.114.11 29.86.70.252