Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.114.185.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51836
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.114.185.99.			IN	A

;; AUTHORITY SECTION:
.			421	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010901 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 13:44:45 CST 2022
;; MSG SIZE  rcvd: 107
Host info
b'Host 99.185.114.139.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 139.114.185.99.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
94.230.88.107 attackbots
Unauthorized connection attempt from IP address 94.230.88.107 on Port 445(SMB)
2020-06-02 03:24:52
115.84.91.81 attackbots
Dovecot Invalid User Login Attempt.
2020-06-02 03:06:39
197.40.7.170 attack
Unauthorized connection attempt from IP address 197.40.7.170 on Port 445(SMB)
2020-06-02 03:23:03
117.50.5.198 attack
Jun  1 05:38:11 mockhub sshd[32676]: Failed password for root from 117.50.5.198 port 51990 ssh2
...
2020-06-02 02:51:07
177.86.74.54 attack
Unauthorized connection attempt from IP address 177.86.74.54 on Port 445(SMB)
2020-06-02 03:06:27
118.107.139.181 attack
Unauthorized connection attempt from IP address 118.107.139.181 on Port 445(SMB)
2020-06-02 03:29:28
104.154.239.199 attack
Jun  1 13:56:27 OPSO sshd\[29008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.154.239.199  user=root
Jun  1 13:56:29 OPSO sshd\[29008\]: Failed password for root from 104.154.239.199 port 56436 ssh2
Jun  1 13:59:59 OPSO sshd\[29323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.154.239.199  user=root
Jun  1 14:00:00 OPSO sshd\[29323\]: Failed password for root from 104.154.239.199 port 32810 ssh2
Jun  1 14:03:20 OPSO sshd\[29668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.154.239.199  user=root
2020-06-02 03:12:29
183.88.243.17 attackbotsspam
Dovecot Invalid User Login Attempt.
2020-06-02 03:05:59
190.138.48.6 attackspambots
Automatic report - Port Scan Attack
2020-06-02 03:18:31
94.102.51.17 attack
Port scan on 21 port(s): 10028 10052 10416 10525 10544 10616 10631 10647 10664 10667 10707 10713 10775 10803 10826 10834 10847 10859 10901 10922 10986
2020-06-02 03:25:28
58.56.140.214 attack
Unauthorized connection attempt from IP address 58.56.140.214 on Port 445(SMB)
2020-06-02 03:17:09
36.76.117.15 attackspambots
20/6/1@08:03:30: FAIL: Alarm-Network address from=36.76.117.15
20/6/1@08:03:30: FAIL: Alarm-Network address from=36.76.117.15
...
2020-06-02 03:02:29
83.103.7.16 attack
Unauthorized connection attempt from IP address 83.103.7.16 on Port 445(SMB)
2020-06-02 03:22:29
184.154.189.92 attackbots
Port scan: Attack repeated for 24 hours
2020-06-02 03:26:10
219.85.138.106 attack
Unauthorized connection attempt from IP address 219.85.138.106 on Port 445(SMB)
2020-06-02 02:57:50

Recently Reported IPs

138.56.84.172 255.68.158.82 76.116.88.226 115.238.195.180
117.245.66.12 148.240.37.63 151.62.227.228 206.50.100.222
76.33.36.204 236.76.2.105 111.80.89.196 243.86.67.157
167.205.212.30 12.206.231.211 124.54.169.131 111.234.114.112
140.143.118.98 133.251.237.250 250.159.180.160 247.38.183.164