Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.114.160.172
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22832
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.114.160.172.		IN	A

;; AUTHORITY SECTION:
.			207	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022012900 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 29 20:43:54 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 172.160.114.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 172.160.114.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
107.174.101.178 attack
Feb  3 07:48:49 lukav-desktop sshd\[4946\]: Invalid user stream from 107.174.101.178
Feb  3 07:48:49 lukav-desktop sshd\[4946\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.174.101.178
Feb  3 07:48:52 lukav-desktop sshd\[4946\]: Failed password for invalid user stream from 107.174.101.178 port 48822 ssh2
Feb  3 07:51:12 lukav-desktop sshd\[6332\]: Invalid user p0o9i8u7 from 107.174.101.178
Feb  3 07:51:12 lukav-desktop sshd\[6332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.174.101.178
2020-02-03 18:40:46
90.84.244.157 attack
$f2bV_matches
2020-02-03 19:07:00
212.64.43.52 attackbotsspam
Unauthorized connection attempt detected from IP address 212.64.43.52 to port 2220 [J]
2020-02-03 18:51:58
155.4.35.142 attack
Unauthorized connection attempt detected from IP address 155.4.35.142 to port 2220 [J]
2020-02-03 18:56:54
191.37.227.136 attack
POST /editBlackAndWhiteList HTTP/1.1n 400 10108 -
2020-02-03 18:37:07
106.54.122.165 attackbotsspam
Unauthorized connection attempt detected from IP address 106.54.122.165 to port 2220 [J]
2020-02-03 18:35:00
151.80.37.18 attackbotsspam
Unauthorized connection attempt detected from IP address 151.80.37.18 to port 2220 [J]
2020-02-03 18:29:36
188.170.192.40 attack
Unauthorized connection attempt from IP address 188.170.192.40 on Port 445(SMB)
2020-02-03 18:54:01
112.85.42.182 attackspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.182  user=root
Failed password for root from 112.85.42.182 port 13699 ssh2
Failed password for root from 112.85.42.182 port 13699 ssh2
Failed password for root from 112.85.42.182 port 13699 ssh2
Failed password for root from 112.85.42.182 port 13699 ssh2
2020-02-03 18:39:50
77.224.78.125 attack
unauthorized connection attempt
2020-02-03 18:51:29
218.78.10.183 attackbotsspam
Unauthorized connection attempt detected from IP address 218.78.10.183 to port 2220 [J]
2020-02-03 18:40:19
61.177.172.158 attackspam
2020-02-03T10:17:57.167044shield sshd\[19294\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.158  user=root
2020-02-03T10:17:59.272438shield sshd\[19294\]: Failed password for root from 61.177.172.158 port 11339 ssh2
2020-02-03T10:18:00.893835shield sshd\[19294\]: Failed password for root from 61.177.172.158 port 11339 ssh2
2020-02-03T10:18:02.792842shield sshd\[19294\]: Failed password for root from 61.177.172.158 port 11339 ssh2
2020-02-03T10:19:01.040358shield sshd\[19400\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.158  user=root
2020-02-03 18:44:22
51.91.56.133 attackspambots
Unauthorized connection attempt detected from IP address 51.91.56.133 to port 2220 [J]
2020-02-03 18:36:12
47.247.62.86 attackspam
Unauthorized connection attempt from IP address 47.247.62.86 on Port 445(SMB)
2020-02-03 19:07:34
5.196.70.107 attack
Unauthorized connection attempt detected from IP address 5.196.70.107 to port 2220 [J]
2020-02-03 19:05:53

Recently Reported IPs

84.118.0.22 199.67.100.197 81.119.191.35 166.65.80.188
160.79.244.162 218.173.42.27 143.187.214.17 26.53.202.238
220.167.220.248 133.248.137.86 30.243.220.237 88.200.111.56
237.27.197.230 177.91.132.90 89.67.110.18 135.177.65.76
43.58.7.246 180.118.46.66 8.179.218.116 253.243.250.225