Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: Nara

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.101.229.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3674
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.101.229.166.		IN	A

;; AUTHORITY SECTION:
.			233	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023020301 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 04 10:49:39 CST 2023
;; MSG SIZE  rcvd: 108
Host info
166.229.101.139.in-addr.arpa domain name pointer ipbfn014-166.kcn.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
166.229.101.139.in-addr.arpa	name = ipbfn014-166.kcn.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
80.66.75.164 attack
2020-07-28T14:53:56.086010vps1033 sshd[16989]: Invalid user cbiu0 from 80.66.75.164 port 58818
2020-07-28T14:53:56.093337vps1033 sshd[16989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.66.75.164
2020-07-28T14:53:56.086010vps1033 sshd[16989]: Invalid user cbiu0 from 80.66.75.164 port 58818
2020-07-28T14:53:58.335165vps1033 sshd[16989]: Failed password for invalid user cbiu0 from 80.66.75.164 port 58818 ssh2
2020-07-28T14:55:55.942776vps1033 sshd[21157]: Invalid user 5 from 80.66.75.164 port 46172
...
2020-07-29 02:58:32
103.242.56.183 attackspam
*Port Scan* detected from 103.242.56.183 (KH/Cambodia/Phnom Penh/Phnom Penh/-). 4 hits in the last 196 seconds
2020-07-29 03:25:27
167.172.133.221 attackbots
Jul 28 12:47:44 george sshd[12580]: Failed password for invalid user nwang from 167.172.133.221 port 49292 ssh2
Jul 28 12:49:57 george sshd[12584]: Invalid user admin from 167.172.133.221 port 52664
Jul 28 12:49:57 george sshd[12584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.133.221 
Jul 28 12:49:59 george sshd[12584]: Failed password for invalid user admin from 167.172.133.221 port 52664 ssh2
Jul 28 12:52:11 george sshd[12605]: Invalid user xlong from 167.172.133.221 port 56036
...
2020-07-29 03:21:44
210.9.47.154 attackspam
sshd jail - ssh hack attempt
2020-07-29 03:17:21
201.131.93.182 attackspambots
Unauthorized connection attempt from IP address 201.131.93.182 on Port 445(SMB)
2020-07-29 02:55:19
51.158.65.150 attack
Jul 28 11:10:09 propaganda sshd[12055]: Connection from 51.158.65.150 port 41740 on 10.0.0.160 port 22 rdomain ""
Jul 28 11:10:10 propaganda sshd[12055]: Connection closed by 51.158.65.150 port 41740 [preauth]
2020-07-29 02:56:12
45.129.33.5 attackbotsspam
ET DROP Dshield Block Listed Source group 1 - port: 4500 proto: tcp cat: Misc Attackbytes: 60
2020-07-29 03:14:06
116.206.196.227 attackbots
xmlrpc attack
2020-07-29 02:54:54
137.74.132.171 attackbots
Jul 28 20:09:59 santamaria sshd\[16733\]: Invalid user liqingxuan from 137.74.132.171
Jul 28 20:09:59 santamaria sshd\[16733\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.132.171
Jul 28 20:10:02 santamaria sshd\[16733\]: Failed password for invalid user liqingxuan from 137.74.132.171 port 55838 ssh2
...
2020-07-29 02:59:55
156.96.154.12 attackspambots
ET DROP Spamhaus DROP Listed Traffic Inbound group 12 - port: 443 proto: tcp cat: Misc Attackbytes: 60
2020-07-29 02:56:59
51.15.241.102 attackspam
2020-07-28T19:43:24.686675n23.at sshd[2377633]: Failed password for invalid user mashuai from 51.15.241.102 port 43084 ssh2
2020-07-28T19:56:35.875423n23.at sshd[2388941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.241.102  user=sshd
2020-07-28T19:56:38.266074n23.at sshd[2388941]: Failed password for sshd from 51.15.241.102 port 33678 ssh2
...
2020-07-29 03:23:47
129.211.65.70 attackbotsspam
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-07-29 03:05:41
61.177.172.168 attackbotsspam
Jul 28 21:31:15 marvibiene sshd[8650]: Failed password for root from 61.177.172.168 port 22811 ssh2
Jul 28 21:31:19 marvibiene sshd[8650]: Failed password for root from 61.177.172.168 port 22811 ssh2
2020-07-29 03:31:59
153.37.98.243 attackspambots
Jul 28 20:09:17 fhem-rasp sshd[7535]: Invalid user jinjiayu from 153.37.98.243 port 53724
...
2020-07-29 03:22:06
70.166.183.140 attack
SSH/22 MH Probe, BF, Hack -
2020-07-29 02:59:02

Recently Reported IPs

98.23.191.82 37.41.20.14 148.101.204.131 130.83.94.81
46.73.154.125 12.152.11.29 81.128.147.75 140.118.239.112
5.224.197.211 185.122.222.20 2.15.20.136 65.175.242.201
42.241.225.91 23.12.51.175 173.135.247.128 9.49.184.194
114.99.22.61 198.2.129.97 11.219.102.210 149.178.200.113