Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.112.227.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10352
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.112.227.249.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 21:49:18 CST 2025
;; MSG SIZE  rcvd: 108
Host info
249.227.112.139.in-addr.arpa domain name pointer tietoevry-owned-address-139-112-227-x.hidden-host.tietoevry.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
249.227.112.139.in-addr.arpa	name = tietoevry-owned-address-139-112-227-x.hidden-host.tietoevry.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
84.17.47.110 attackspambots
(From turbomavro@gmail.com) The leader in short-term investing in the cryptocurrency market.   
The leader in payments for the affiliate program.   
 
 
Investment program: 
 
Investment currency: BTC. 
The investment period is 2 days. 
Minimum profit is 10% 
 
Registration here:  https://bit.ly/3gr3l6q     
 
Get + 10% every 2 days to your personal Bitcoin wallet in addition to your balance. 
 
For example: invest 0.1 bitcoins today, in 2 days you will receive 0.11 bitcoins in your personal bitcoin wallet. 
 
 
The best affiliate program - a real find for MLM agents   
 
5% for the referral of the first level (direct registration) 
3% for the referral of the second level 
1% for the referral of the third level 
 
Referral bonuses are paid the next day after the referral donation. 
The bonus goes to your BTC address the day after the novice's donation. 
Any reinvestment of participants, the leader receives a full bonus! 
 
Registration here:  https://bit.ly/3gr3l6q
2020-09-05 04:26:12
185.220.102.240 attackspambots
Sep  4 21:04:44 piServer sshd[9624]: Failed password for root from 185.220.102.240 port 14996 ssh2
Sep  4 21:04:47 piServer sshd[9624]: Failed password for root from 185.220.102.240 port 14996 ssh2
Sep  4 21:04:50 piServer sshd[9624]: Failed password for root from 185.220.102.240 port 14996 ssh2
Sep  4 21:04:52 piServer sshd[9624]: Failed password for root from 185.220.102.240 port 14996 ssh2
...
2020-09-05 04:24:33
128.199.169.90 attackbotsspam
firewall-block, port(s): 31341/tcp
2020-09-05 04:08:09
27.24.31.92 attackbots
Port Scan detected!
...
2020-09-05 04:38:38
207.58.170.145 attackspambots
Received: from netlemonger.com (207.58.170.145.nettlemonger.com. [207.58.170.145])
        by mx.google.com with ESMTPS id e1si823792qka.206.2020.09.03.00.00.11
        for <>
        (version=TLS1 cipher=ECDHE-ECDSA-AES128-SHA bits=128/128);
        Thu, 03 Sep 2020 00:00:11 -0700 (PDT)
Received-SPF: neutral (google.com: 207.58.170.145 is neither permitted nor denied by best guess record for domain of return@restojob.lp) client-ip=207.58.170.145;
Authentication-Results: mx.google.com;
       dkim=pass header.i=@nettlemonger.com header.s=key1 header.b=VfrF941Y;
       spf=neutral (google.com: 207.58.170.145 is neither permitted nor denied by best guess record for domain of return@restojob.lp) smtp.mailfrom=return@restojob.lp;
       dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=nettlemonger.com
2020-09-05 04:07:09
185.220.102.243 attack
Sep  4 21:00:56 piServer sshd[9341]: Failed password for root from 185.220.102.243 port 31742 ssh2
Sep  4 21:00:58 piServer sshd[9341]: Failed password for root from 185.220.102.243 port 31742 ssh2
Sep  4 21:01:01 piServer sshd[9341]: Failed password for root from 185.220.102.243 port 31742 ssh2
Sep  4 21:01:05 piServer sshd[9341]: Failed password for root from 185.220.102.243 port 31742 ssh2
...
2020-09-05 04:25:44
118.89.102.242 attackbots
Sep  4 19:54:09 l03 sshd[3985]: Invalid user simona from 118.89.102.242 port 32804
...
2020-09-05 04:34:47
82.166.85.112 attackspam
Automatic report - Banned IP Access
2020-09-05 04:41:49
174.217.9.21 attack
Brute forcing email accounts
2020-09-05 04:20:23
93.87.143.242 attackspambots
Honeypot attack, port: 445, PTR: 93-87-143-242.dynamic.isp.telekom.rs.
2020-09-05 04:27:33
41.92.107.180 attackbotsspam
Sep  3 18:42:22 mellenthin postfix/smtpd[19910]: NOQUEUE: reject: RCPT from unknown[41.92.107.180]: 554 5.7.1 Service unavailable; Client host [41.92.107.180] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/41.92.107.180; from= to= proto=ESMTP helo=<[41.92.107.180]>
2020-09-05 04:21:38
23.224.37.18 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-05 04:12:00
37.187.20.60 attack
$f2bV_matches
2020-09-05 04:22:18
140.143.9.145 attack
Sep  1 08:02:05 kmh-wmh-003-nbg03 sshd[16370]: Invalid user system from 140.143.9.145 port 49096
Sep  1 08:02:05 kmh-wmh-003-nbg03 sshd[16370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.9.145
Sep  1 08:02:07 kmh-wmh-003-nbg03 sshd[16370]: Failed password for invalid user system from 140.143.9.145 port 49096 ssh2
Sep  1 08:02:08 kmh-wmh-003-nbg03 sshd[16370]: Received disconnect from 140.143.9.145 port 49096:11: Bye Bye [preauth]
Sep  1 08:02:08 kmh-wmh-003-nbg03 sshd[16370]: Disconnected from 140.143.9.145 port 49096 [preauth]
Sep  1 08:14:40 kmh-wmh-003-nbg03 sshd[17754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.9.145  user=r.r
Sep  1 08:14:42 kmh-wmh-003-nbg03 sshd[17754]: Failed password for r.r from 140.143.9.145 port 52240 ssh2
Sep  1 08:14:42 kmh-wmh-003-nbg03 sshd[17754]: Received disconnect from 140.143.9.145 port 52240:11: Bye Bye [preauth]
Sep  1 08:14:........
-------------------------------
2020-09-05 04:32:22
122.118.114.118 attackspam
Honeypot attack, port: 445, PTR: 122-118-114-118.dynamic-ip.hinet.net.
2020-09-05 04:23:33

Recently Reported IPs

61.31.12.198 144.74.138.29 50.84.145.118 150.176.13.220
233.117.208.176 20.73.68.154 40.255.145.115 135.220.106.97
178.227.180.224 211.174.244.143 138.1.89.114 209.140.154.175
18.128.165.60 217.188.104.34 195.252.51.217 37.53.134.90
191.61.118.213 218.2.219.70 51.241.149.21 200.83.219.70