Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Oslo

Region: Oslo

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.105.227.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38289
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.105.227.169.		IN	A

;; AUTHORITY SECTION:
.			464	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020050101 1800 900 604800 86400

;; Query time: 99 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 02 00:12:17 CST 2020
;; MSG SIZE  rcvd: 119
Host info
Host 169.227.105.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 169.227.105.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.190.2 attackspambots
May 28 10:52:55 * sshd[1552]: Failed password for root from 222.186.190.2 port 56878 ssh2
May 28 10:53:09 * sshd[1552]: error: maximum authentication attempts exceeded for root from 222.186.190.2 port 56878 ssh2 [preauth]
2020-05-28 16:55:16
128.199.33.116 attackspam
May 28 06:30:18 mail sshd[358]: Failed password for root from 128.199.33.116 port 53804 ssh2
...
2020-05-28 16:29:56
162.243.140.16 attackspambots
7777/tcp 7474/tcp 2235/tcp...
[2020-04-29/05-27]24pkt,21pt.(tcp),1pt.(udp)
2020-05-28 17:06:11
138.255.0.27 attack
May 28 16:04:57 localhost sshd[328824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.255.0.27  user=root
May 28 16:04:59 localhost sshd[328824]: Failed password for root from 138.255.0.27 port 56860 ssh2
...
2020-05-28 17:10:58
103.145.12.115 attack
[2020-05-28 04:39:33] NOTICE[1157][C-0000a1d6] chan_sip.c: Call from '' (103.145.12.115:53389) to extension '0046313116026' rejected because extension not found in context 'public'.
[2020-05-28 04:39:33] SECURITY[1173] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-05-28T04:39:33.144-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0046313116026",SessionID="0x7f5f10678288",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/103.145.12.115/53389",ACLName="no_extension_match"
[2020-05-28 04:44:07] NOTICE[1157][C-0000a1d8] chan_sip.c: Call from '' (103.145.12.115:55977) to extension '01146313116026' rejected because extension not found in context 'public'.
[2020-05-28 04:44:07] SECURITY[1173] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-05-28T04:44:07.435-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="01146313116026",SessionID="0x7f5f10678288",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/103
...
2020-05-28 17:09:17
179.191.123.46 attackspam
2020-05-28T11:02:03.7672211240 sshd\[27374\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.191.123.46  user=root
2020-05-28T11:02:06.0994981240 sshd\[27374\]: Failed password for root from 179.191.123.46 port 46722 ssh2
2020-05-28T11:05:38.2609201240 sshd\[27518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.191.123.46  user=root
...
2020-05-28 17:06:30
116.196.94.108 attackbots
May 28 08:08:54 124388 sshd[26172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.94.108  user=root
May 28 08:08:56 124388 sshd[26172]: Failed password for root from 116.196.94.108 port 60950 ssh2
May 28 08:10:38 124388 sshd[26246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.94.108  user=root
May 28 08:10:40 124388 sshd[26246]: Failed password for root from 116.196.94.108 port 55940 ssh2
May 28 08:12:16 124388 sshd[26249]: Invalid user dbus from 116.196.94.108 port 50930
2020-05-28 16:54:26
107.180.120.64 attack
Automatic report - XMLRPC Attack
2020-05-28 16:59:58
58.186.22.226 attackspam
SSH login attempts.
2020-05-28 16:38:10
36.37.114.55 attack
SSH login attempts.
2020-05-28 17:16:16
220.158.148.132 attack
SSH login attempts.
2020-05-28 16:45:51
198.108.66.226 attackspambots
firewall-block, port(s): 9337/tcp
2020-05-28 16:46:23
106.13.50.145 attack
Invalid user postgres from 106.13.50.145 port 32848
2020-05-28 17:02:44
106.13.36.10 attackbots
SSH brute-force: detected 8 distinct usernames within a 24-hour window.
2020-05-28 16:41:22
186.147.236.4 attackbots
Failed password for invalid user xerox from 186.147.236.4 port 52367 ssh2
2020-05-28 17:05:49

Recently Reported IPs

68.196.84.237 77.38.81.126 36.9.51.58 14.32.143.169
174.8.181.12 179.164.67.218 124.13.135.201 43.243.127.82
189.166.172.2 206.140.162.160 162.243.142.187 149.216.16.120
18.36.20.242 23.210.173.119 207.18.206.103 183.186.130.205
4.100.136.88 118.130.234.194 154.182.126.22 11.50.16.81