Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.113.80.190
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27523
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.113.80.190.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012501 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 03:20:39 CST 2025
;; MSG SIZE  rcvd: 107
Host info
190.80.113.139.in-addr.arpa domain name pointer tietoevry-owned-address-139-113-80-x.hidden-host.tietoevry.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
190.80.113.139.in-addr.arpa	name = tietoevry-owned-address-139-113-80-x.hidden-host.tietoevry.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
201.236.79.18 attackspambots
Unauthorized connection attempt from IP address 201.236.79.18 on Port 445(SMB)
2020-09-06 02:57:03
47.31.38.87 attack
1599237970 - 09/04/2020 18:46:10 Host: 47.31.38.87/47.31.38.87 Port: 445 TCP Blocked
2020-09-06 02:55:30
95.216.12.234 attackspam
SP-Scan 80:3786 detected 2020.09.04 18:57:22
blocked until 2020.10.24 12:00:09
2020-09-06 02:52:29
200.6.203.85 attackbotsspam
Postfix attempt blocked due to public blacklist entry
2020-09-06 02:32:13
132.255.94.2 attack
Dovecot Invalid User Login Attempt.
2020-09-06 02:37:04
89.245.109.197 attackbots
Sep  4 18:46:28 mellenthin postfix/smtpd[30890]: NOQUEUE: reject: RCPT from i59F56DC5.versanet.de[89.245.109.197]: 554 5.7.1 Service unavailable; Client host [89.245.109.197] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/89.245.109.197; from= to= proto=ESMTP helo=
2020-09-06 02:38:02
165.227.125.173 attackspambots
165.227.125.173 - - [23/Jun/2020:08:39:15 +0000] "\x00\x0E8?\xB5" 400 166 "-" "-"
2020-09-06 02:44:01
45.143.93.231 attack
Malicious Scan Attempt
2020-09-06 02:46:15
116.74.4.85 attackspam
Failed password for invalid user ftp2 from 116.74.4.85 port 40442 ssh2
2020-09-06 02:32:53
179.243.246.171 attackspambots
Unauthorized connection attempt from IP address 179.243.246.171 on Port 445(SMB)
2020-09-06 02:59:03
193.112.160.203 attack
(sshd) Failed SSH login from 193.112.160.203 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  5 09:17:47 optimus sshd[22950]: Invalid user riana from 193.112.160.203
Sep  5 09:17:47 optimus sshd[22950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.160.203 
Sep  5 09:17:49 optimus sshd[22950]: Failed password for invalid user riana from 193.112.160.203 port 48426 ssh2
Sep  5 09:21:51 optimus sshd[24159]: Invalid user raspberry from 193.112.160.203
Sep  5 09:21:51 optimus sshd[24159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.160.203
2020-09-06 02:33:34
221.179.103.2 attackbots
Automatic report BANNED IP
2020-09-06 02:20:00
106.52.20.112 attack
Bruteforce detected by fail2ban
2020-09-06 02:48:43
145.239.29.217 attackspam
ENG,DEF GET /wp-login.php
2020-09-06 02:42:44
193.0.151.10 attackspambots
Attempted connection to port 445.
2020-09-06 02:56:18

Recently Reported IPs

36.119.57.161 185.192.120.144 222.240.15.237 6.173.220.99
21.57.61.154 18.225.244.35 85.53.180.93 90.9.249.180
180.129.166.205 98.206.180.184 71.212.6.98 51.174.242.176
48.162.133.114 27.66.172.20 63.190.24.115 64.146.84.160
199.75.69.51 127.94.206.85 57.230.207.180 73.36.94.244