Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.106.227.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27694
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.106.227.39.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 21:46:18 CST 2025
;; MSG SIZE  rcvd: 107
Host info
39.227.106.139.in-addr.arpa domain name pointer tietoevry-owned-address-139-106-227-x.hidden-host.tietoevry.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
39.227.106.139.in-addr.arpa	name = tietoevry-owned-address-139-106-227-x.hidden-host.tietoevry.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
177.11.55.36 attack
From return-andre=truweb.com.br@digitalplanos.we.bs Tue May 26 20:48:14 2020
Received: from dig846-mx-7.digitalplanos.we.bs ([177.11.55.36]:51719)
2020-05-27 19:09:14
174.76.35.15 attackbotsspam
Port scan, web form exploit, probed for CMS logins then brute-force login
2020-05-27 19:06:45
59.72.122.148 attackbots
May 27 05:47:45 ArkNodeAT sshd\[25233\]: Invalid user oracle from 59.72.122.148
May 27 05:47:45 ArkNodeAT sshd\[25233\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.72.122.148
May 27 05:47:47 ArkNodeAT sshd\[25233\]: Failed password for invalid user oracle from 59.72.122.148 port 44990 ssh2
2020-05-27 19:28:36
217.182.64.45 attackbotsspam
May 27 09:13:13 vps670341 sshd[14990]: Invalid user teamspeak from 217.182.64.45 port 56793
2020-05-27 19:18:31
116.196.99.241 attackbots
May 27 13:05:27 h2829583 sshd[11595]: Failed password for root from 116.196.99.241 port 39354 ssh2
2020-05-27 19:17:41
188.186.182.56 attackspam
Automatic report - Banned IP Access
2020-05-27 19:22:55
186.122.148.9 attack
Invalid user mky from 186.122.148.9 port 35234
2020-05-27 19:07:14
156.96.118.172 attackspam
May 27 03:48:43 nopemail postfix/smtpd[20823]: NOQUEUE: reject: RCPT from unknown[156.96.118.172]: 554 5.7.1 : Relay access denied; from= to= proto=ESMTP helo=
...
2020-05-27 18:53:16
82.214.131.179 attackbotsspam
SSH Brute-Forcing (server1)
2020-05-27 19:00:37
87.107.121.214 attackbotsspam
Lines containing failures of 87.107.121.214 (max 1000)
May 25 02:56:47 localhost sshd[27688]: User r.r from 87.107.121.214 not allowed because listed in DenyUsers
May 25 02:56:47 localhost sshd[27688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.107.121.214  user=r.r
May 25 02:56:48 localhost sshd[27688]: Failed password for invalid user r.r from 87.107.121.214 port 58932 ssh2
May 25 02:56:49 localhost sshd[27688]: Received disconnect from 87.107.121.214 port 58932:11: Bye Bye [preauth]
May 25 02:56:49 localhost sshd[27688]: Disconnected from invalid user r.r 87.107.121.214 port 58932 [preauth]
May 25 03:09:00 localhost sshd[31193]: User r.r from 87.107.121.214 not allowed because listed in DenyUsers
May 25 03:09:00 localhost sshd[31193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.107.121.214  user=r.r
May 25 03:09:01 localhost sshd[31193]: Failed password for invalid user r.r ........
------------------------------
2020-05-27 19:16:00
94.102.56.215 attack
SIP/5060 Probe, BF, Hack -
2020-05-27 18:56:14
221.232.176.11 attack
 TCP (SYN) 221.232.176.11:48623 -> port 80, len 40
2020-05-27 19:00:54
193.112.127.245 attackbots
k+ssh-bruteforce
2020-05-27 19:08:11
106.225.129.108 attackspam
Triggered by Fail2Ban at Ares web server
2020-05-27 19:28:08
193.232.100.106 attackspambots
SMB Server BruteForce Attack
2020-05-27 19:02:02

Recently Reported IPs

253.152.135.34 187.252.152.118 83.137.6.198 19.232.165.98
95.63.223.189 63.105.112.7 241.93.82.233 185.49.44.91
245.36.237.6 5.28.27.10 34.168.164.123 38.185.5.74
83.24.230.184 148.80.208.66 5.251.170.142 23.250.151.54
114.117.110.133 181.50.148.144 253.67.4.100 161.218.33.3