Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.114.222.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2129
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.114.222.133.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 10:15:26 CST 2025
;; MSG SIZE  rcvd: 108
Host info
133.222.114.139.in-addr.arpa domain name pointer tietoevry-owned-address-139-114-222-x.hidden-host.tietoevry.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
133.222.114.139.in-addr.arpa	name = tietoevry-owned-address-139-114-222-x.hidden-host.tietoevry.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
54.37.157.88 attack
Aug 18 11:13:06 webhost01 sshd[18775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.157.88
Aug 18 11:13:08 webhost01 sshd[18775]: Failed password for invalid user hf from 54.37.157.88 port 34330 ssh2
...
2020-08-18 12:20:45
125.35.92.130 attack
(sshd) Failed SSH login from 125.35.92.130 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug 18 00:46:42 grace sshd[31294]: Invalid user admin from 125.35.92.130 port 43715
Aug 18 00:46:44 grace sshd[31294]: Failed password for invalid user admin from 125.35.92.130 port 43715 ssh2
Aug 18 00:53:52 grace sshd[32560]: Invalid user splunk from 125.35.92.130 port 14273
Aug 18 00:53:55 grace sshd[32560]: Failed password for invalid user splunk from 125.35.92.130 port 14273 ssh2
Aug 18 00:57:48 grace sshd[1073]: Invalid user guest from 125.35.92.130 port 43904
2020-08-18 08:29:05
36.92.107.2 attack
Icarus honeypot on github
2020-08-18 12:05:03
51.178.17.63 attackbots
2020-08-18T03:56:50.767001abusebot.cloudsearch.cf sshd[29603]: Invalid user chef from 51.178.17.63 port 33908
2020-08-18T03:56:50.772442abusebot.cloudsearch.cf sshd[29603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.ip-51-178-17.eu
2020-08-18T03:56:50.767001abusebot.cloudsearch.cf sshd[29603]: Invalid user chef from 51.178.17.63 port 33908
2020-08-18T03:56:52.363689abusebot.cloudsearch.cf sshd[29603]: Failed password for invalid user chef from 51.178.17.63 port 33908 ssh2
2020-08-18T04:05:47.253372abusebot.cloudsearch.cf sshd[29930]: Invalid user rainbow from 51.178.17.63 port 43102
2020-08-18T04:05:47.258079abusebot.cloudsearch.cf sshd[29930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.ip-51-178-17.eu
2020-08-18T04:05:47.253372abusebot.cloudsearch.cf sshd[29930]: Invalid user rainbow from 51.178.17.63 port 43102
2020-08-18T04:05:49.572719abusebot.cloudsearch.cf sshd[29930]: Failed password 
...
2020-08-18 12:21:39
106.13.99.107 attackbotsspam
bruteforce detected
2020-08-18 08:28:29
112.85.42.87 attackbotsspam
2020-08-18T00:17:17.235576shield sshd\[10277\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.87  user=root
2020-08-18T00:17:18.404053shield sshd\[10277\]: Failed password for root from 112.85.42.87 port 54300 ssh2
2020-08-18T00:17:20.649999shield sshd\[10277\]: Failed password for root from 112.85.42.87 port 54300 ssh2
2020-08-18T00:17:23.166257shield sshd\[10277\]: Failed password for root from 112.85.42.87 port 54300 ssh2
2020-08-18T00:18:13.842961shield sshd\[10391\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.87  user=root
2020-08-18 08:26:10
89.109.35.231 attackspambots
WEB SPAM: viagra price canadian pharmacy posting rules
  viagra generico my messages
 tadalafil 20 mg
 - using viagra for teasing
 https://ciagorilla.com - cialis canada
 viagra online prescription forum contains new posts
2020-08-18 12:20:12
128.199.244.150 attack
CMS (WordPress or Joomla) login attempt.
2020-08-18 12:08:03
186.122.149.144 attack
Aug 18 01:09:14 pve1 sshd[28122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.149.144 
Aug 18 01:09:16 pve1 sshd[28122]: Failed password for invalid user fuhao from 186.122.149.144 port 38652 ssh2
...
2020-08-18 08:30:52
201.71.12.254 attackbotsspam
1597723061 - 08/18/2020 05:57:41 Host: 201.71.12.254/201.71.12.254 Port: 445 TCP Blocked
2020-08-18 12:00:57
118.69.55.141 attackbotsspam
Aug 18 05:56:26 home sshd[803535]: Failed password for postgres from 118.69.55.141 port 46009 ssh2
Aug 18 05:57:38 home sshd[803869]: Invalid user httpd from 118.69.55.141 port 59885
Aug 18 05:57:38 home sshd[803869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.69.55.141 
Aug 18 05:57:38 home sshd[803869]: Invalid user httpd from 118.69.55.141 port 59885
Aug 18 05:57:40 home sshd[803869]: Failed password for invalid user httpd from 118.69.55.141 port 59885 ssh2
...
2020-08-18 12:02:41
85.209.0.251 attack
Scanned 10 times in the last 24 hours on port 22
2020-08-18 08:19:09
125.21.227.181 attackbotsspam
2020-08-18T06:01:18.845201mail.broermann.family sshd[4366]: Invalid user tiewenbin from 125.21.227.181 port 50362
2020-08-18T06:01:18.850989mail.broermann.family sshd[4366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.21.227.181
2020-08-18T06:01:18.845201mail.broermann.family sshd[4366]: Invalid user tiewenbin from 125.21.227.181 port 50362
2020-08-18T06:01:20.900858mail.broermann.family sshd[4366]: Failed password for invalid user tiewenbin from 125.21.227.181 port 50362 ssh2
2020-08-18T06:07:37.747967mail.broermann.family sshd[4615]: Invalid user hotel from 125.21.227.181 port 60412
...
2020-08-18 12:10:37
66.240.219.146 attackspam
Automatic report - Banned IP Access
2020-08-18 12:22:28
103.133.104.222 attackspambots
dovecot email abuse
2020-08-18 08:16:33

Recently Reported IPs

51.238.242.209 75.220.1.125 77.18.33.229 76.60.165.83
55.32.24.10 63.229.164.219 121.10.200.255 54.205.106.177
5.116.68.42 68.76.145.84 229.250.39.60 240.241.206.214
189.105.105.178 255.28.250.56 51.7.13.61 207.161.157.16
253.70.194.100 91.34.171.55 244.112.157.46 191.195.144.75