Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.112.26.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12769
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.112.26.131.			IN	A

;; AUTHORITY SECTION:
.			398	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020050500 1800 900 604800 86400

;; Query time: 96 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 05 14:29:35 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 131.26.112.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 131.26.112.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.203.201.135 attack
firewall-block, port(s): 137/udp
2020-01-01 08:56:34
178.62.79.227 attack
SSH auth scanning - multiple failed logins
2020-01-01 08:54:18
92.118.161.5 attackbots
firewall-block, port(s): 5351/udp
2020-01-01 09:02:59
193.70.42.33 attackspambots
Invalid user highspeed from 193.70.42.33 port 53524
2020-01-01 09:06:31
78.200.84.78 attack
Dec 31 22:31:49 mars sshd[41029]: Invalid user glady from 78.200.84.78
Dec 31 22:31:51 mars sshd[41029]: Failed password for invalid user glady from 78.200.84.78 port 41632 ssh2
Dec 31 22:50:13 mars sshd[47921]: Invalid user smhostname from 78.200.84.78
Dec 31 22:50:16 mars sshd[47921]: Failed password for invalid user smhostname from 78.200.84.78 port 49404 ssh2
Dec 31 23:22:07 mars sshd[10798]: Invalid user guest from 78.200.84.78


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=78.200.84.78
2020-01-01 09:15:36
139.59.244.225 attackspambots
Invalid user elset from 139.59.244.225 port 45754
2020-01-01 08:42:51
117.239.149.94 attackbots
404 NOT FOUND
2020-01-01 08:59:40
198.108.67.53 attack
Dec 31 23:49:38 debian-2gb-nbg1-2 kernel: \[91911.375830\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=198.108.67.53 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=37 ID=10199 PROTO=TCP SPT=8721 DPT=8200 WINDOW=1024 RES=0x00 SYN URGP=0
2020-01-01 09:13:12
201.116.12.217 attackbotsspam
Jan  1 01:31:56 ns37 sshd[6301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.116.12.217
2020-01-01 09:11:06
81.4.106.78 attack
Dec 31 23:47:35 h2177944 sshd\[16124\]: Invalid user etemad from 81.4.106.78 port 59662
Dec 31 23:47:35 h2177944 sshd\[16124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.4.106.78
Dec 31 23:47:37 h2177944 sshd\[16124\]: Failed password for invalid user etemad from 81.4.106.78 port 59662 ssh2
Dec 31 23:50:00 h2177944 sshd\[16209\]: Invalid user zaccone from 81.4.106.78 port 59440
...
2020-01-01 09:03:18
91.163.111.5 attackbotsspam
Multiple SSH login attempts.
2020-01-01 09:06:46
206.189.156.198 attack
Jan  1 00:55:41 vps691689 sshd[29703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.156.198
Jan  1 00:55:43 vps691689 sshd[29703]: Failed password for invalid user deploy5 from 206.189.156.198 port 53722 ssh2
...
2020-01-01 08:57:23
152.136.122.130 attackspambots
Automatic report - Banned IP Access
2020-01-01 08:57:38
79.97.188.172 attackbotsspam
/var/log/messages:Dec 31 14:38:27 sanyalnet-cloud-vps audispd: node=sanyalnet-cloud-vps.freeddns.org type=CRYPTO_SESSION msg=audhostname(1577803107.820:108047): pid=4145 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-server cipher=aes256-ctr ksize=256 mac=hmac-sha2-256 pfs=ecdh-sha2-nistp256 spid=4146 suid=74 rport=40098 laddr=104.167.106.93 lport=22  exe="/usr/sbin/sshd" hostname=? addr=79.97.188.172 terminal=? res=success'
/var/log/messages:Dec 31 14:38:27 sanyalnet-cloud-vps audispd: node=sanyalnet-cloud-vps.freeddns.org type=CRYPTO_SESSION msg=audhostname(1577803107.824:108048): pid=4145 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-client cipher=aes256-ctr ksize=256 mac=hmac-sha2-256 pfs=ecdh-sha2-nistp256 spid=4146 suid=74 rport=40098 laddr=104.167.106.93 lport=22  exe="/usr/sbin/sshd" hostname=? addr=79.97.188.172 terminal=? res=success'
/var/log/messages:Dec 31 14:38:28 sanyalnet-cloud-vps fail2ban.filter[1551]: INFO [sshd]........
-------------------------------
2020-01-01 08:52:47
49.234.207.171 attackbots
Jan  1 00:35:02 dedicated sshd[16554]: Invalid user hunfredo from 49.234.207.171 port 42788
2020-01-01 08:50:28

Recently Reported IPs

78.52.89.121 47.100.56.7 125.202.179.243 159.229.97.56
217.28.145.86 8.48.217.125 115.72.214.85 63.60.18.91
206.189.200.86 123.170.125.130 179.221.72.99 148.153.87.4
206.189.131.161 156.96.156.73 47.59.5.132 5.144.7.206
14.251.200.1 136.26.63.106 180.76.103.247 1.92.46.26