Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: Evry Norge As

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.109.117.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46089
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.109.117.140.		IN	A

;; AUTHORITY SECTION:
.			1094	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060701 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jun 08 02:39:41 CST 2019
;; MSG SIZE  rcvd: 119

Host info
Host 140.117.109.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 140.117.109.139.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
40.86.225.247 attackbots
lfd: (smtpauth) Failed SMTP AUTH login from 40.86.225.247 (-): 5 in the last 3600 secs - Tue Jun  5 17:53:45 2018
2020-02-24 05:25:00
117.85.92.204 attack
Brute force blocker - service: proftpd1 - aantal: 44 - Tue Jun  5 14:40:14 2018
2020-02-24 05:28:59
173.242.113.168 attackbotsspam
lfd: (smtpauth) Failed SMTP AUTH login from 173.242.113.168 (-): 5 in the last 3600 secs - Sun Jun  3 21:26:14 2018
2020-02-24 05:39:35
213.175.204.244 attackspam
lfd: (smtpauth) Failed SMTP AUTH login from 213.175.204.244 (server.tna.dz): 5 in the last 3600 secs - Sat Jun  9 05:15:08 2018
2020-02-24 05:03:16
168.232.130.50 attackbots
Feb 23 13:22:35 ip-172-31-62-245 sshd\[19423\]: Failed password for root from 168.232.130.50 port 54067 ssh2\
Feb 23 13:22:52 ip-172-31-62-245 sshd\[19425\]: Failed password for root from 168.232.130.50 port 54079 ssh2\
Feb 23 13:23:11 ip-172-31-62-245 sshd\[19427\]: Failed password for root from 168.232.130.50 port 54093 ssh2\
Feb 23 13:23:24 ip-172-31-62-245 sshd\[19431\]: Invalid user admin from 168.232.130.50\
Feb 23 13:23:26 ip-172-31-62-245 sshd\[19431\]: Failed password for invalid user admin from 168.232.130.50 port 54103 ssh2\
2020-02-24 05:10:27
140.250.95.226 attack
lfd: (smtpauth) Failed SMTP AUTH login from 140.250.95.226 (CN/China/-): 5 in the last 3600 secs - Thu Jun  7 12:39:01 2018
2020-02-24 05:15:10
177.92.16.186 attack
Feb 23 06:27:58 hanapaa sshd\[30919\]: Invalid user !Qaz@Wsx from 177.92.16.186
Feb 23 06:27:58 hanapaa sshd\[30919\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.92.16.186
Feb 23 06:28:00 hanapaa sshd\[30919\]: Failed password for invalid user !Qaz@Wsx from 177.92.16.186 port 18341 ssh2
Feb 23 06:31:54 hanapaa sshd\[31210\]: Invalid user ansible from 177.92.16.186
Feb 23 06:31:54 hanapaa sshd\[31210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.92.16.186
2020-02-24 05:28:07
83.205.46.31 attack
Invalid user sundapeng from 83.205.46.31 port 34550
2020-02-24 05:31:43
222.186.175.183 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.183  user=root
Failed password for root from 222.186.175.183 port 56712 ssh2
Failed password for root from 222.186.175.183 port 56712 ssh2
Failed password for root from 222.186.175.183 port 56712 ssh2
Failed password for root from 222.186.175.183 port 56712 ssh2
2020-02-24 05:20:05
221.201.97.129 attack
Brute force blocker - service: proftpd1, proftpd2 - aantal: 73 - Wed Jun  6 03:20:16 2018
2020-02-24 05:23:41
45.136.108.85 attackbots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-02-24 05:16:24
180.109.200.80 attackbotsspam
Brute force blocker - service: proftpd1 - aantal: 67 - Mon Jun  4 03:50:14 2018
2020-02-24 05:37:48
114.226.65.32 attackbots
lfd: (smtpauth) Failed SMTP AUTH login from 114.226.65.32 (-): 5 in the last 3600 secs - Fri Jun  8 17:50:31 2018
2020-02-24 05:05:13
82.202.167.213 attackspambots
lfd: (smtpauth) Failed SMTP AUTH login from 82.202.167.213 (RU/Russia/ad9hf.example.com): 5 in the last 3600 secs - Fri Jun  8 22:59:49 2018
2020-02-24 05:06:32
111.61.172.116 attackspam
Brute force blocker - service: proftpd1 - aantal: 25 - Thu Jun  7 07:45:17 2018
2020-02-24 05:07:28

Recently Reported IPs

144.64.46.138 47.216.136.174 166.177.170.126 94.103.84.67
104.244.73.219 109.88.170.137 50.190.35.119 162.243.173.214
186.233.178.94 125.115.193.202 71.190.152.213 93.217.232.60
153.206.79.24 143.202.117.206 94.32.225.96 217.16.184.45
77.247.110.116 44.184.232.23 92.73.243.137 38.246.132.235