Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       139.105.0.0 - 139.120.255.255
CIDR:           139.106.0.0/15, 139.120.0.0/16, 139.112.0.0/13, 139.108.0.0/14, 139.105.0.0/16
NetName:        RIPE-ERX-139-105-0-0
NetHandle:      NET-139-105-0-0-1
Parent:         NET139 (NET-139-0-0-0-0)
NetType:        Early Registrations, Transferred to RIPE NCC
OriginAS:       
Organization:   RIPE Network Coordination Centre (RIPE)
RegDate:        2004-03-03
Updated:        2025-02-10
Comment:        These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref:            https://rdap.arin.net/registry/ip/139.105.0.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois.ripe.net


OrgName:        RIPE Network Coordination Centre
OrgId:          RIPE
Address:        P.O. Box 10096
City:           Amsterdam
StateProv:      
PostalCode:     1001EB
Country:        NL
RegDate:        
Updated:        2013-07-29
Ref:            https://rdap.arin.net/registry/entity/RIPE

ReferralServer:  whois.ripe.net
ResourceLink:  https://apps.db.ripe.net/db-web-ui/query

OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName:   Abuse Contact
OrgAbusePhone:  +31205354444 
OrgAbuseEmail:  abuse@ripe.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE3850-ARIN

OrgTechHandle: RNO29-ARIN
OrgTechName:   RIPE NCC Operations
OrgTechPhone:  +31 20 535 4444 
OrgTechEmail:  hostmaster@ripe.net
OrgTechRef:    https://rdap.arin.net/registry/entity/RNO29-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.116.96.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29613
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.116.96.132.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042702 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 28 10:28:45 CST 2026
;; MSG SIZE  rcvd: 107
Host info
132.96.116.139.in-addr.arpa domain name pointer tietoevry-owned-address-139-116-96-x.hidden-host.tietoevry.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
132.96.116.139.in-addr.arpa	name = tietoevry-owned-address-139-116-96-x.hidden-host.tietoevry.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
68.183.146.249 attack
68.183.146.249 - - [19/Jul/2020:22:15:06 +0200] "GET /wp-login.php HTTP/1.1" 200 5738 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
68.183.146.249 - - [19/Jul/2020:22:15:07 +0200] "POST /wp-login.php HTTP/1.1" 200 5989 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
68.183.146.249 - - [19/Jul/2020:22:15:09 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-07-20 04:54:50
94.102.49.193 attack
Jul 19 22:38:22 debian-2gb-nbg1-2 kernel: \[17449645.167376\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=94.102.49.193 DST=195.201.40.59 LEN=33 TOS=0x10 PREC=0x00 TTL=120 ID=61168 PROTO=UDP SPT=32523 DPT=3283 LEN=13
2020-07-20 04:42:28
222.186.175.169 attackspambots
Jul 19 22:24:28 vps639187 sshd\[413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
Jul 19 22:24:30 vps639187 sshd\[413\]: Failed password for root from 222.186.175.169 port 9494 ssh2
Jul 19 22:24:33 vps639187 sshd\[413\]: Failed password for root from 222.186.175.169 port 9494 ssh2
...
2020-07-20 04:35:46
45.141.84.94 attack
Jul 19 22:59:08 debian-2gb-nbg1-2 kernel: \[17450891.310110\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.141.84.94 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=62730 PROTO=TCP SPT=45435 DPT=5316 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-20 05:00:40
162.243.130.23 attack
162.243.130.23 - - [19/Jul/2020:11:03:28 -0500] "GET https://www.ad5gb.com/owa/auth/logon.aspx?url=https%3a%2f%2f1%2fecp%2f HTTP/1.1" 400 346 000 0 0 0 178 295 0 0 0 NONE FIN FIN ERR_INVALID_REQ
2020-07-20 04:48:32
218.164.61.119 attackspambots
1595174630 - 07/19/2020 18:03:50 Host: 218.164.61.119/218.164.61.119 Port: 445 TCP Blocked
2020-07-20 04:28:14
58.213.198.74 attack
Jul 20 01:11:29 itv-usvr-01 sshd[27983]: Invalid user deploy from 58.213.198.74
Jul 20 01:11:29 itv-usvr-01 sshd[27983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.213.198.74
Jul 20 01:11:29 itv-usvr-01 sshd[27983]: Invalid user deploy from 58.213.198.74
Jul 20 01:11:31 itv-usvr-01 sshd[27983]: Failed password for invalid user deploy from 58.213.198.74 port 7869 ssh2
Jul 20 01:13:35 itv-usvr-01 sshd[28044]: Invalid user europa from 58.213.198.74
2020-07-20 04:33:34
147.135.203.181 attackspam
Jul 19 20:33:30 *** sshd[17650]: Invalid user shuang from 147.135.203.181
2020-07-20 04:58:49
201.39.70.186 attackspambots
Total attacks: 2
2020-07-20 05:01:22
176.126.167.111 attackbotsspam
 TCP (SYN) 176.126.167.111:56414 -> port 1433, len 40
2020-07-20 04:26:39
139.162.90.220 attackspambots
 TCP (SYN) 139.162.90.220:57006 -> port 1723, len 44
2020-07-20 04:28:53
45.55.189.113 attackbots
Jul 19 19:10:23 buvik sshd[23232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.189.113
Jul 19 19:10:25 buvik sshd[23232]: Failed password for invalid user git from 45.55.189.113 port 47911 ssh2
Jul 19 19:14:55 buvik sshd[23812]: Invalid user postgres from 45.55.189.113
...
2020-07-20 04:43:33
123.127.226.217 attack
1433/tcp 1433/tcp 1433/tcp...
[2020-05-30/07-19]4pkt,1pt.(tcp)
2020-07-20 04:44:02
218.58.107.74 attack
07/19/2020-12:03:56.862048 218.58.107.74 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-07-20 04:23:05
180.167.201.243 attackbotsspam
1433/tcp 1433/tcp 1433/tcp...
[2020-05-19/07-19]14pkt,1pt.(tcp)
2020-07-20 05:01:41

Recently Reported IPs

2606:4700:10::ac43:180e 2606:4700:10::6816:1802 2606:4700:10::6816:503 2606:4700:10::ac43:2869
214.34.11.246 85.217.149.33 10.11.37.154 2606:4700:10::6816:2778
2606:4700:10::6814:7408 2606:4700:10::6814:8560 35.187.125.183 216.84.224.144
151.101.1.242 160.187.110.153 47.128.123.0 104.243.35.94
223.104.161.155 87.236.176.207 3.25.84.50 27.14.246.202