Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.112.238.15
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38971
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.112.238.15.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 18:17:06 CST 2025
;; MSG SIZE  rcvd: 107
Host info
15.238.112.139.in-addr.arpa domain name pointer tietoevry-owned-address-139-112-238-x.hidden-host.tietoevry.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
15.238.112.139.in-addr.arpa	name = tietoevry-owned-address-139-112-238-x.hidden-host.tietoevry.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
159.203.87.130 attackbots
Automatic report - Banned IP Access
2019-12-24 07:38:32
222.186.175.202 attackspam
Dec 24 00:31:59 ns3110291 sshd\[6961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202  user=root
Dec 24 00:32:01 ns3110291 sshd\[6961\]: Failed password for root from 222.186.175.202 port 41622 ssh2
Dec 24 00:32:04 ns3110291 sshd\[6961\]: Failed password for root from 222.186.175.202 port 41622 ssh2
Dec 24 00:32:07 ns3110291 sshd\[6961\]: Failed password for root from 222.186.175.202 port 41622 ssh2
Dec 24 00:32:10 ns3110291 sshd\[6961\]: Failed password for root from 222.186.175.202 port 41622 ssh2
...
2019-12-24 07:40:38
148.217.94.19 attack
Brute force SSH attack
2019-12-24 07:41:03
49.233.130.155 attack
Dec 24 00:49:59 srv-ubuntu-dev3 sshd[21372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.130.155  user=news
Dec 24 00:50:01 srv-ubuntu-dev3 sshd[21372]: Failed password for news from 49.233.130.155 port 43078 ssh2
Dec 24 00:52:09 srv-ubuntu-dev3 sshd[21585]: Invalid user strathearn from 49.233.130.155
Dec 24 00:52:09 srv-ubuntu-dev3 sshd[21585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.130.155
Dec 24 00:52:09 srv-ubuntu-dev3 sshd[21585]: Invalid user strathearn from 49.233.130.155
Dec 24 00:52:11 srv-ubuntu-dev3 sshd[21585]: Failed password for invalid user strathearn from 49.233.130.155 port 60902 ssh2
Dec 24 00:54:24 srv-ubuntu-dev3 sshd[21807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.130.155  user=root
Dec 24 00:54:26 srv-ubuntu-dev3 sshd[21807]: Failed password for root from 49.233.130.155 port 50506 ssh2
Dec 24 00:57:04 srv
...
2019-12-24 07:57:42
212.237.3.8 attackspambots
Dec 24 00:03:49 h2177944 sshd\[24218\]: Invalid user named from 212.237.3.8 port 40884
Dec 24 00:03:49 h2177944 sshd\[24218\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.3.8
Dec 24 00:03:52 h2177944 sshd\[24218\]: Failed password for invalid user named from 212.237.3.8 port 40884 ssh2
Dec 24 00:18:18 h2177944 sshd\[24705\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.3.8  user=root
...
2019-12-24 07:43:22
148.72.207.248 attack
Dec 23 23:44:02 game-panel sshd[10894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.207.248
Dec 23 23:44:04 game-panel sshd[10894]: Failed password for invalid user admin6 from 148.72.207.248 port 37850 ssh2
Dec 23 23:46:36 game-panel sshd[11005]: Failed password for root from 148.72.207.248 port 34046 ssh2
2019-12-24 08:03:44
113.172.52.150 attackspambots
Lines containing failures of 113.172.52.150
Dec 23 23:29:04 shared10 sshd[8791]: Invalid user admin from 113.172.52.150 port 57907
Dec 23 23:29:04 shared10 sshd[8791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.172.52.150
Dec 23 23:29:06 shared10 sshd[8791]: Failed password for invalid user admin from 113.172.52.150 port 57907 ssh2
Dec 23 23:29:06 shared10 sshd[8791]: Connection closed by invalid user admin 113.172.52.150 port 57907 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=113.172.52.150
2019-12-24 07:32:39
45.141.86.103 attackbots
Dec 24 01:01:31 debian-2gb-nbg1-2 kernel: \[798434.492954\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.141.86.103 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=13611 PROTO=TCP SPT=56439 DPT=10233 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-24 08:03:09
200.90.86.196 attackspam
SQL APT Attack
Reported by and Credit to nic@wlink.biz from IP 118.69.71.82
2019-12-24 07:30:53
186.103.223.10 attackspambots
Dec 23 23:48:18 mout sshd[15480]: Invalid user prokaziuk from 186.103.223.10 port 42740
2019-12-24 07:32:23
96.250.98.32 attackbots
Dec 23 23:39:50 km20725 sshd\[8593\]: Invalid user oracle from 96.250.98.32Dec 23 23:39:52 km20725 sshd\[8593\]: Failed password for invalid user oracle from 96.250.98.32 port 59552 ssh2Dec 23 23:45:23 km20725 sshd\[8921\]: Failed password for root from 96.250.98.32 port 49730 ssh2Dec 23 23:48:15 km20725 sshd\[9075\]: Invalid user ftptest1 from 96.250.98.32
...
2019-12-24 07:39:36
185.176.27.34 attack
12/23/2019-17:58:28.886483 185.176.27.34 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-12-24 08:00:29
72.143.15.82 attack
Automatic report - Banned IP Access
2019-12-24 07:42:51
51.15.187.114 attackspambots
Lines containing failures of 51.15.187.114
Dec 23 23:25:56 mailserver sshd[18337]: Invalid user lclin from 51.15.187.114 port 39889
Dec 23 23:25:56 mailserver sshd[18337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.187.114
Dec 23 23:25:59 mailserver sshd[18337]: Failed password for invalid user lclin from 51.15.187.114 port 39889 ssh2
Dec 23 23:25:59 mailserver sshd[18337]: Received disconnect from 51.15.187.114 port 39889:11: Bye Bye [preauth]
Dec 23 23:25:59 mailserver sshd[18337]: Disconnected from invalid user lclin 51.15.187.114 port 39889 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=51.15.187.114
2019-12-24 08:05:06
159.203.190.189 attack
Dec 23 23:51:43 icinga sshd[20710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.190.189
Dec 23 23:51:45 icinga sshd[20710]: Failed password for invalid user webadmin from 159.203.190.189 port 42890 ssh2
...
2019-12-24 07:50:47

Recently Reported IPs

179.39.133.173 22.103.250.196 243.113.2.73 4.36.246.55
190.12.250.121 26.59.0.77 77.57.165.169 104.173.213.169
164.194.162.84 243.19.162.53 241.85.80.93 70.27.98.9
122.185.150.110 155.237.102.147 147.246.176.149 106.239.119.70
68.243.54.113 3.174.48.177 53.95.52.93 114.90.14.75