Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.109.90.111
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34319
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.109.90.111.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 12:47:25 CST 2025
;; MSG SIZE  rcvd: 107
Host info
111.90.109.139.in-addr.arpa domain name pointer tietoevry-owned-address-139-109-90-x.hidden-host.tietoevry.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
111.90.109.139.in-addr.arpa	name = tietoevry-owned-address-139-109-90-x.hidden-host.tietoevry.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
125.26.133.155 attackbots
Unauthorized connection attempt from IP address 125.26.133.155 on Port 445(SMB)
2020-05-14 19:31:59
222.186.180.8 attackspam
May 14 12:38:18 minden010 sshd[21900]: Failed password for root from 222.186.180.8 port 61538 ssh2
May 14 12:38:21 minden010 sshd[21900]: Failed password for root from 222.186.180.8 port 61538 ssh2
May 14 12:38:24 minden010 sshd[21900]: Failed password for root from 222.186.180.8 port 61538 ssh2
May 14 12:38:27 minden010 sshd[21900]: Failed password for root from 222.186.180.8 port 61538 ssh2
...
2020-05-14 18:55:24
49.213.180.181 attack
Attempted connection to port 88.
2020-05-14 19:13:36
206.189.210.235 attackbots
"fail2ban match"
2020-05-14 19:26:00
114.46.196.113 attackbotsspam
Attempted connection to port 445.
2020-05-14 19:19:57
162.243.139.4 attackbotsspam
[portscan] tcp/23 [TELNET]
*(RWIN=65535)(05140756)
2020-05-14 19:02:31
104.131.71.105 attackspam
May 14 11:49:37 mail sshd\[11416\]: Invalid user anaconda from 104.131.71.105
May 14 11:49:37 mail sshd\[11416\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.71.105
May 14 11:49:40 mail sshd\[11416\]: Failed password for invalid user anaconda from 104.131.71.105 port 44388 ssh2
...
2020-05-14 19:23:52
202.86.189.194 attackspam
Unauthorized connection attempt from IP address 202.86.189.194 on Port 445(SMB)
2020-05-14 19:03:03
113.184.99.35 attackspam
Attempted connection to port 445.
2020-05-14 19:20:36
128.1.91.91 attackspambots
05/13/2020-23:46:06.494734 128.1.91.91 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-14 19:27:34
106.116.118.89 attackbotsspam
...
2020-05-14 19:04:30
171.225.251.81 attack
Attempted connection to port 445.
2020-05-14 19:16:16
111.242.96.210 attackspam
port 23
2020-05-14 19:17:21
203.59.97.181 attackspambots
Attempted connection to port 88.
2020-05-14 19:14:50
14.245.44.220 attackspam
Unauthorized connection attempt from IP address 14.245.44.220 on Port 445(SMB)
2020-05-14 19:31:35

Recently Reported IPs

167.239.150.21 56.3.108.76 2.251.137.52 159.208.201.137
75.20.48.185 254.188.78.183 234.203.101.197 160.209.97.178
165.50.17.189 212.85.98.57 147.100.197.23 22.175.104.224
232.233.209.156 28.188.119.37 234.199.165.74 187.28.2.123
21.120.55.28 194.153.101.253 33.244.185.129 20.156.237.68