Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.118.119.232
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30088
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.118.119.232.		IN	A

;; AUTHORITY SECTION:
.			439	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023052400 1800 900 604800 86400

;; Query time: 78 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 24 16:03:44 CST 2023
;; MSG SIZE  rcvd: 108
Host info
232.119.118.139.in-addr.arpa domain name pointer tietoevry-owned-address-139-118-119-x.hidden-host.tietoevry.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
232.119.118.139.in-addr.arpa	name = tietoevry-owned-address-139-118-119-x.hidden-host.tietoevry.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
37.114.171.39 attack
Invalid user admin from 37.114.171.39 port 48251
2020-01-15 05:00:03
187.45.105.147 attackbots
2020-01-14T21:01:53.888632shield sshd\[18292\]: Invalid user hadoop from 187.45.105.147 port 54838
2020-01-14T21:01:53.895256shield sshd\[18292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.45.105.147
2020-01-14T21:01:56.077092shield sshd\[18292\]: Failed password for invalid user hadoop from 187.45.105.147 port 54838 ssh2
2020-01-14T21:04:34.757916shield sshd\[18940\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.45.105.147  user=root
2020-01-14T21:04:36.378091shield sshd\[18940\]: Failed password for root from 187.45.105.147 port 48388 ssh2
2020-01-15 05:11:17
51.38.48.127 attackspambots
Unauthorized connection attempt detected from IP address 51.38.48.127 to port 2220 [J]
2020-01-15 04:56:12
37.114.129.253 attack
Invalid user admin from 37.114.129.253 port 53172
2020-01-15 05:00:26
106.13.161.29 attack
Jan 14 22:11:03 vps58358 sshd\[30714\]: Invalid user testuser from 106.13.161.29Jan 14 22:11:05 vps58358 sshd\[30714\]: Failed password for invalid user testuser from 106.13.161.29 port 52208 ssh2Jan 14 22:14:28 vps58358 sshd\[30746\]: Invalid user hms from 106.13.161.29Jan 14 22:14:30 vps58358 sshd\[30746\]: Failed password for invalid user hms from 106.13.161.29 port 49406 ssh2Jan 14 22:17:51 vps58358 sshd\[30774\]: Invalid user gan from 106.13.161.29Jan 14 22:17:53 vps58358 sshd\[30774\]: Failed password for invalid user gan from 106.13.161.29 port 46614 ssh2
...
2020-01-15 05:21:34
185.100.87.206 attackbotsspam
Unauthorized connection attempt detected from IP address 185.100.87.206 to port 8022 [J]
2020-01-15 05:12:42
44.227.254.171 attack
Unauthorized connection attempt detected from IP address 44.227.254.171 to port 2220 [J]
2020-01-15 04:57:31
190.1.203.180 attackbotsspam
Unauthorized connection attempt detected from IP address 190.1.203.180 to port 2220 [J]
2020-01-15 05:08:57
222.186.15.166 attack
Jan 14 22:23:07 vmanager6029 sshd\[19601\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.166  user=root
Jan 14 22:23:09 vmanager6029 sshd\[19601\]: Failed password for root from 222.186.15.166 port 25213 ssh2
Jan 14 22:23:11 vmanager6029 sshd\[19601\]: Failed password for root from 222.186.15.166 port 25213 ssh2
2020-01-15 05:24:58
180.76.116.68 attackbotsspam
Dec 27 10:50:59 odroid64 sshd\[11188\]: Invalid user navnitlal from 180.76.116.68
Dec 27 10:50:59 odroid64 sshd\[11188\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.116.68
...
2020-01-15 05:14:45
27.34.8.120 attackbotsspam
Invalid user admin from 27.34.8.120 port 54638
2020-01-15 05:00:56
103.245.181.2 attackbots
Jan 14 22:17:52 vmanager6029 sshd\[19492\]: Invalid user raghu from 103.245.181.2 port 53317
Jan 14 22:17:52 vmanager6029 sshd\[19492\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.245.181.2
Jan 14 22:17:54 vmanager6029 sshd\[19492\]: Failed password for invalid user raghu from 103.245.181.2 port 53317 ssh2
2020-01-15 05:20:06
2.137.131.113 attackbotsspam
Unauthorized connection attempt detected from IP address 2.137.131.113 to port 22 [J]
2020-01-15 05:02:38
189.212.120.165 attack
Unauthorized connection attempt detected from IP address 189.212.120.165 to port 23 [J]
2020-01-15 05:09:17
206.189.35.218 attackspambots
Invalid user admin from 206.189.35.218 port 63117
2020-01-15 05:05:20

Recently Reported IPs

170.51.165.68 83.67.7.42 7.249.8.68 7.58.16.37
49.74.9.43 117.233.75.26 104.44.40.239 114.83.152.35
146.96.84.178 187.205.103.56 37.161.180.3 163.172.191.204
27.173.232.141 138.138.156.69 14.132.9.49 109.77.130.216
77.102.147.0 88.237.56.141 32.236.28.239 203.81.30.94