Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.118.90.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21444
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.118.90.68.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 19:44:07 CST 2025
;; MSG SIZE  rcvd: 106
Host info
68.90.118.139.in-addr.arpa domain name pointer tietoevry-owned-address-139-118-90-x.hidden-host.tietoevry.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.90.118.139.in-addr.arpa	name = tietoevry-owned-address-139-118-90-x.hidden-host.tietoevry.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
159.148.4.235 attackbots
Sep  1 01:51:19 sachi sshd\[10855\]: Invalid user stella from 159.148.4.235
Sep  1 01:51:19 sachi sshd\[10855\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.148.4.235
Sep  1 01:51:20 sachi sshd\[10855\]: Failed password for invalid user stella from 159.148.4.235 port 43534 ssh2
Sep  1 01:55:15 sachi sshd\[11203\]: Invalid user dulce from 159.148.4.235
Sep  1 01:55:15 sachi sshd\[11203\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.148.4.235
2019-09-01 20:00:58
157.230.146.88 attackbotsspam
$f2bV_matches
2019-09-01 19:41:34
159.89.104.243 attack
Sep  1 10:13:24 ns341937 sshd[23351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.104.243
Sep  1 10:13:26 ns341937 sshd[23351]: Failed password for invalid user ss2701 from 159.89.104.243 port 50506 ssh2
Sep  1 10:23:51 ns341937 sshd[25239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.104.243
...
2019-09-01 19:35:31
133.167.106.31 attackspambots
Sep  1 07:11:33 XXX sshd[42473]: Invalid user tim from 133.167.106.31 port 47224
2019-09-01 20:19:58
128.201.232.100 attackspam
Sep  1 13:20:12 mail1 sshd\[26612\]: Invalid user tomcat from 128.201.232.100 port 57512
Sep  1 13:20:12 mail1 sshd\[26612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.201.232.100
Sep  1 13:20:13 mail1 sshd\[26612\]: Failed password for invalid user tomcat from 128.201.232.100 port 57512 ssh2
Sep  1 13:30:00 mail1 sshd\[31083\]: Invalid user alix from 128.201.232.100 port 48210
Sep  1 13:30:00 mail1 sshd\[31083\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.201.232.100
...
2019-09-01 20:21:35
159.65.8.65 attackspam
Sep  1 09:48:00 mail sshd\[4969\]: Failed password for invalid user ram from 159.65.8.65 port 52236 ssh2
Sep  1 09:52:39 mail sshd\[5644\]: Invalid user mary from 159.65.8.65 port 40508
Sep  1 09:52:39 mail sshd\[5644\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.8.65
Sep  1 09:52:41 mail sshd\[5644\]: Failed password for invalid user mary from 159.65.8.65 port 40508 ssh2
Sep  1 09:57:20 mail sshd\[6336\]: Invalid user user from 159.65.8.65 port 57016
2019-09-01 20:21:04
190.145.25.166 attack
$f2bV_matches_ltvn
2019-09-01 20:10:01
80.211.237.20 attackspam
Sep  1 12:33:01 srv206 sshd[8600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.237.20  user=root
Sep  1 12:33:04 srv206 sshd[8600]: Failed password for root from 80.211.237.20 port 50088 ssh2
...
2019-09-01 20:08:38
67.205.153.16 attack
...
2019-09-01 19:48:28
110.19.70.33 attackbots
Lines containing failures of 110.19.70.33
/var/log/apache/pucorp.org.log:2019-08-31T10:24:50.607510+01:00 ticdesk sshd[31783]: Invalid user support from 110.19.70.33 port 45257
/var/log/apache/pucorp.org.log:2019-08-31T10:24:50.627396+01:00 ticdesk sshd[31783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.19.70.33 
/var/log/apache/pucorp.org.log:2019-08-31T10:24:50.644120+01:00 ticdesk sshd[31783]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.19.70.33 user=support
/var/log/apache/pucorp.org.log:2019-08-31T10:24:52.993640+01:00 ticdesk sshd[31783]: Failed password for invalid user support from 110.19.70.33 port 45257 ssh2
/var/log/apache/pucorp.org.log:2019-08-31T10:24:56.145574+01:00 ticdesk sshd[31783]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.19.70.33 user=support
/var/log/apache/pucorp.org.log:2019-08-31T10:24:58.318776+01:00 t........
------------------------------
2019-09-01 20:12:56
113.113.120.26 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-09-01 20:07:22
178.33.236.23 attack
Sep  1 14:10:12 SilenceServices sshd[15906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.236.23
Sep  1 14:10:14 SilenceServices sshd[15906]: Failed password for invalid user berta from 178.33.236.23 port 56066 ssh2
Sep  1 14:13:43 SilenceServices sshd[17277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.236.23
2019-09-01 20:19:17
75.50.59.234 attackbots
Sep  1 13:20:15 dedicated sshd[19236]: Invalid user passwd from 75.50.59.234 port 39830
2019-09-01 19:36:10
112.215.113.10 attackspam
Sep  1 07:36:19 vps200512 sshd\[24176\]: Invalid user beethoven from 112.215.113.10
Sep  1 07:36:19 vps200512 sshd\[24176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.215.113.10
Sep  1 07:36:21 vps200512 sshd\[24176\]: Failed password for invalid user beethoven from 112.215.113.10 port 37247 ssh2
Sep  1 07:41:20 vps200512 sshd\[24359\]: Invalid user slurm from 112.215.113.10
Sep  1 07:41:20 vps200512 sshd\[24359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.215.113.10
2019-09-01 19:44:25
190.211.160.253 attackspam
Sep  1 00:27:43 tdfoods sshd\[10910\]: Invalid user ec2-user from 190.211.160.253
Sep  1 00:27:43 tdfoods sshd\[10910\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.211.160.253
Sep  1 00:27:45 tdfoods sshd\[10910\]: Failed password for invalid user ec2-user from 190.211.160.253 port 55350 ssh2
Sep  1 00:33:04 tdfoods sshd\[11344\]: Invalid user es from 190.211.160.253
Sep  1 00:33:04 tdfoods sshd\[11344\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.211.160.253
2019-09-01 19:55:34

Recently Reported IPs

41.105.154.164 48.19.141.207 125.15.153.211 76.251.63.22
84.62.192.237 172.212.107.66 91.69.148.216 93.253.136.41
205.101.234.22 163.77.231.235 170.18.203.197 176.83.75.210
149.137.148.4 23.118.204.243 60.18.142.32 94.179.52.178
220.53.46.29 244.182.90.214 18.76.129.247 12.25.242.70