Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.118.146.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42786
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.118.146.216.		IN	A

;; AUTHORITY SECTION:
.			499	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110201 1800 900 604800 86400

;; Query time: 105 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 03 04:51:17 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 216.146.118.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 216.146.118.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
114.143.25.156 attack
email spam
2019-11-05 22:39:17
177.101.187.54 attackspambots
Automatic report - Port Scan Attack
2019-11-05 23:03:33
177.137.160.233 attackbots
email spam
2019-11-05 22:30:58
182.61.40.236 attack
email spam
2019-11-05 22:28:49
160.238.163.18 attackbots
email spam
2019-11-05 22:36:58
106.12.114.173 attackspambots
Nov  5 15:41:47 bouncer sshd\[12199\]: Invalid user kriti from 106.12.114.173 port 51357
Nov  5 15:41:47 bouncer sshd\[12199\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.114.173 
Nov  5 15:41:49 bouncer sshd\[12199\]: Failed password for invalid user kriti from 106.12.114.173 port 51357 ssh2
...
2019-11-05 22:54:22
123.206.69.81 attackbotsspam
Nov  5 15:35:35 sd-53420 sshd\[26445\]: Invalid user asam from 123.206.69.81
Nov  5 15:35:35 sd-53420 sshd\[26445\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.69.81
Nov  5 15:35:36 sd-53420 sshd\[26445\]: Failed password for invalid user asam from 123.206.69.81 port 55221 ssh2
Nov  5 15:41:48 sd-53420 sshd\[26917\]: User root from 123.206.69.81 not allowed because none of user's groups are listed in AllowGroups
Nov  5 15:41:48 sd-53420 sshd\[26917\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.69.81  user=root
...
2019-11-05 22:53:57
192.99.247.232 attackbotsspam
Nov  5 15:41:39 dedicated sshd[17033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.247.232  user=root
Nov  5 15:41:42 dedicated sshd[17033]: Failed password for root from 192.99.247.232 port 55258 ssh2
2019-11-05 22:58:59
103.15.140.141 attack
email spam
2019-11-05 22:43:01
167.172.89.107 attack
Lines containing failures of 167.172.89.107
Nov  5 15:38:23 shared11 sshd[9004]: Invalid user gamefiles from 167.172.89.107 port 43578
Nov  5 15:38:23 shared11 sshd[9004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.89.107
Nov  5 15:38:26 shared11 sshd[9004]: Failed password for invalid user gamefiles from 167.172.89.107 port 43578 ssh2
Nov  5 15:38:26 shared11 sshd[9004]: Received disconnect from 167.172.89.107 port 43578:11: Bye Bye [preauth]
Nov  5 15:38:26 shared11 sshd[9004]: Disconnected from invalid user gamefiles 167.172.89.107 port 43578 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=167.172.89.107
2019-11-05 23:01:06
82.81.241.25 attack
Automatic report - Port Scan Attack
2019-11-05 22:49:17
96.77.77.53 attack
2019-11-05 07:45:09 H=(96-77-77-53-static.hfc.comcastbusiness.net) [96.77.77.53]:53996 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/query/ip/96.77.77.53)
2019-11-05 07:45:10 H=(96-77-77-53-static.hfc.comcastbusiness.net) [96.77.77.53]:53996 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/query/ip/96.77.77.53)
2019-11-05 07:45:11 H=(96-77-77-53-static.hfc.comcastbusiness.net) [96.77.77.53]:53996 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3) (https://www.spamhaus.org/sbl/query/SBLCSS)
...
2019-11-05 22:43:27
142.93.106.197 attackspambots
port scan and connect, tcp 5432 (postgresql)
2019-11-05 23:12:29
106.13.99.245 attackbots
Nov  5 09:41:35 Tower sshd[24917]: Connection from 106.13.99.245 port 32824 on 192.168.10.220 port 22
Nov  5 09:41:39 Tower sshd[24917]: Invalid user swsgest from 106.13.99.245 port 32824
Nov  5 09:41:39 Tower sshd[24917]: error: Could not get shadow information for NOUSER
Nov  5 09:41:39 Tower sshd[24917]: Failed password for invalid user swsgest from 106.13.99.245 port 32824 ssh2
Nov  5 09:41:40 Tower sshd[24917]: Received disconnect from 106.13.99.245 port 32824:11: Bye Bye [preauth]
Nov  5 09:41:40 Tower sshd[24917]: Disconnected from invalid user swsgest 106.13.99.245 port 32824 [preauth]
2019-11-05 22:46:38
106.13.96.248 attack
Lines containing failures of 106.13.96.248
Nov  4 15:33:30 install sshd[4466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.96.248  user=r.r
Nov  4 15:33:33 install sshd[4466]: Failed password for r.r from 106.13.96.248 port 34238 ssh2
Nov  4 15:33:33 install sshd[4466]: Received disconnect from 106.13.96.248 port 34238:11: Bye Bye [preauth]
Nov  4 15:33:33 install sshd[4466]: Disconnected from authenticating user r.r 106.13.96.248 port 34238 [preauth]
Nov  4 15:48:32 install sshd[6967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.96.248  user=r.r
Nov  4 15:48:33 install sshd[6967]: Failed password for r.r from 106.13.96.248 port 52642 ssh2
Nov  4 15:48:34 install sshd[6967]: Received disconnect from 106.13.96.248 port 52642:11: Bye Bye [preauth]
Nov  4 15:48:34 install sshd[6967]: Disconnected from authenticating user r.r 106.13.96.248 port 52642 [preauth]
Nov  4 15:54:1........
------------------------------
2019-11-05 22:50:21

Recently Reported IPs

23.23.253.98 153.142.133.76 89.36.214.18 146.25.7.116
114.214.164.141 116.1.154.108 175.220.23.235 92.70.150.24
177.109.52.238 115.250.198.114 156.169.45.69 120.157.83.136
77.112.50.182 64.32.11.58 130.96.231.74 0.12.175.239
63.44.55.77 217.179.233.1 194.100.65.84 61.0.96.185