Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.113.246.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16307
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.113.246.21.			IN	A

;; AUTHORITY SECTION:
.			450	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032400 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 24 18:51:14 CST 2022
;; MSG SIZE  rcvd: 107
Host info
21.246.113.139.in-addr.arpa domain name pointer gnd.os.ergo.no.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.246.113.139.in-addr.arpa	name = gnd.os.ergo.no.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
161.35.9.18 attackspam
SSH Brute Force
2020-07-24 07:35:49
202.77.105.110 attackbots
$f2bV_matches
2020-07-24 07:50:05
188.0.128.53 attackbotsspam
Jul 23 23:18:10 hell sshd[6227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.0.128.53
Jul 23 23:18:12 hell sshd[6227]: Failed password for invalid user msi from 188.0.128.53 port 44930 ssh2
...
2020-07-24 07:29:47
162.243.170.252 attackbotsspam
2020-07-23T16:57:00.637931linuxbox-skyline sshd[165632]: Invalid user ester from 162.243.170.252 port 38824
...
2020-07-24 07:23:34
162.196.204.142 attackspam
Invalid user ses from 162.196.204.142 port 33308
2020-07-24 07:30:52
87.251.74.100 attackspam
Jul 24 01:34:32 debian-2gb-nbg1-2 kernel: \[17805794.975378\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=87.251.74.100 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=60314 PROTO=TCP SPT=46349 DPT=38783 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-24 07:47:48
193.35.51.13 attackspam
2020-07-24 01:16:06 dovecot_login authenticator failed for \(\[193.35.51.13\]\) \[193.35.51.13\]: 535 Incorrect authentication data \(set_id=harald.schueller@jugend-ohne-grenzen.net\)
2020-07-24 01:16:13 dovecot_login authenticator failed for \(\[193.35.51.13\]\) \[193.35.51.13\]: 535 Incorrect authentication data
2020-07-24 01:16:22 dovecot_login authenticator failed for \(\[193.35.51.13\]\) \[193.35.51.13\]: 535 Incorrect authentication data
2020-07-24 01:16:26 dovecot_login authenticator failed for \(\[193.35.51.13\]\) \[193.35.51.13\]: 535 Incorrect authentication data
2020-07-24 01:16:38 dovecot_login authenticator failed for \(\[193.35.51.13\]\) \[193.35.51.13\]: 535 Incorrect authentication data
2020-07-24 01:16:43 dovecot_login authenticator failed for \(\[193.35.51.13\]\) \[193.35.51.13\]: 535 Incorrect authentication data
...
2020-07-24 07:34:43
61.55.158.215 attackspambots
Jul 24 00:11:11 h2779839 sshd[21888]: Invalid user jzb from 61.55.158.215 port 24965
Jul 24 00:11:11 h2779839 sshd[21888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.55.158.215
Jul 24 00:11:11 h2779839 sshd[21888]: Invalid user jzb from 61.55.158.215 port 24965
Jul 24 00:11:13 h2779839 sshd[21888]: Failed password for invalid user jzb from 61.55.158.215 port 24965 ssh2
Jul 24 00:15:51 h2779839 sshd[21938]: Invalid user lsy from 61.55.158.215 port 24966
Jul 24 00:15:51 h2779839 sshd[21938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.55.158.215
Jul 24 00:15:51 h2779839 sshd[21938]: Invalid user lsy from 61.55.158.215 port 24966
Jul 24 00:15:53 h2779839 sshd[21938]: Failed password for invalid user lsy from 61.55.158.215 port 24966 ssh2
Jul 24 00:20:31 h2779839 sshd[22005]: Invalid user cj from 61.55.158.215 port 24967
...
2020-07-24 07:43:16
161.35.16.174 attack
Jun 10 23:38:51 pi sshd[29771]: Failed password for root from 161.35.16.174 port 59016 ssh2
2020-07-24 07:47:01
162.241.94.40 attackbots
 TCP (SYN) 162.241.94.40:48522 -> port 21083, len 44
2020-07-24 07:24:46
172.69.63.212 attackspam
Jul 23 22:18:49 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=172.69.63.212 DST=79.143.186.54 LEN=52 TOS=0x00 PREC=0x00 TTL=59 ID=33891 DF PROTO=TCP SPT=43120 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0 Jul 23 22:18:50 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=172.69.63.212 DST=79.143.186.54 LEN=52 TOS=0x00 PREC=0x00 TTL=59 ID=33892 DF PROTO=TCP SPT=43120 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0 Jul 23 22:18:52 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=172.69.63.212 DST=79.143.186.54 LEN=52 TOS=0x00 PREC=0x00 TTL=59 ID=33893 DF PROTO=TCP SPT=43120 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0
2020-07-24 07:12:09
70.35.201.143 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-07-23T21:57:23Z and 2020-07-23T22:04:51Z
2020-07-24 07:28:55
121.134.159.21 attackbots
Jul 24 00:13:47 ajax sshd[22291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21 
Jul 24 00:13:49 ajax sshd[22291]: Failed password for invalid user zli from 121.134.159.21 port 41674 ssh2
2020-07-24 07:15:02
125.35.92.130 attack
Jul 23 16:12:43 dignus sshd[4278]: Failed password for invalid user tyler from 125.35.92.130 port 33470 ssh2
Jul 23 16:18:01 dignus sshd[5582]: Invalid user git from 125.35.92.130 port 46773
Jul 23 16:18:01 dignus sshd[5582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.35.92.130
Jul 23 16:18:03 dignus sshd[5582]: Failed password for invalid user git from 125.35.92.130 port 46773 ssh2
Jul 23 16:23:25 dignus sshd[6382]: Invalid user git from 125.35.92.130 port 29560
...
2020-07-24 07:36:03
175.6.148.219 attackspambots
Jul 24 01:06:58 vmd17057 sshd[1278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.6.148.219 
Jul 24 01:07:00 vmd17057 sshd[1278]: Failed password for invalid user klaus from 175.6.148.219 port 39352 ssh2
...
2020-07-24 07:26:02

Recently Reported IPs

156.64.244.186 182.107.251.82 191.112.158.213 19.242.90.102
111.138.236.244 12.221.138.127 80.205.119.83 6.240.107.102
29.239.247.32 44.112.184.205 152.46.177.125 240.133.143.124
223.223.102.0 38.189.100.93 80.146.228.94 119.179.159.94
194.150.235.5 181.170.143.215 171.204.126.247 95.103.154.142