Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.119.172.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60537
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.119.172.107.		IN	A

;; AUTHORITY SECTION:
.			291	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010702 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 08 05:55:09 CST 2022
;; MSG SIZE  rcvd: 108
Host info
107.172.119.139.in-addr.arpa domain name pointer tietoevry-owned-address-139-119-172-x.hidden-host.tietoevry.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
107.172.119.139.in-addr.arpa	name = tietoevry-owned-address-139-119-172-x.hidden-host.tietoevry.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
142.93.1.100 attackbots
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-02-13 23:41:24
120.151.113.120 attackspam
2020-02-13T13:45:43.875796vps773228.ovh.net sshd[14339]: Invalid user front from 120.151.113.120 port 41382
2020-02-13T13:45:43.892908vps773228.ovh.net sshd[14339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=zedray.lnk.telstra.net
2020-02-13T13:45:43.875796vps773228.ovh.net sshd[14339]: Invalid user front from 120.151.113.120 port 41382
2020-02-13T13:45:45.972046vps773228.ovh.net sshd[14339]: Failed password for invalid user front from 120.151.113.120 port 41382 ssh2
2020-02-13T14:24:20.774526vps773228.ovh.net sshd[14508]: Invalid user admin from 120.151.113.120 port 38578
2020-02-13T14:24:20.788384vps773228.ovh.net sshd[14508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=zedray.lnk.telstra.net
2020-02-13T14:24:20.774526vps773228.ovh.net sshd[14508]: Invalid user admin from 120.151.113.120 port 38578
2020-02-13T14:24:22.952349vps773228.ovh.net sshd[14508]: Failed password for invalid user admin fro
...
2020-02-13 23:09:50
45.143.223.120 attack
Unauthorized connection attempt detected from IP address 45.143.223.120 to port 25
2020-02-13 23:57:35
171.232.95.153 attackbots
1581601743 - 02/13/2020 14:49:03 Host: 171.232.95.153/171.232.95.153 Port: 445 TCP Blocked
2020-02-13 23:48:50
182.52.229.178 attackbots
Lines containing failures of 182.52.229.178 (max 1000)
Feb 13 15:21:43 Server sshd[27261]: Did not receive identification string from 182.52.229.178 port 50800
Feb 13 15:21:45 Server sshd[27262]: Invalid user system from 182.52.229.178 port 55732
Feb 13 15:21:45 Server sshd[27262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.52.229.178
Feb 13 15:21:46 Server sshd[27262]: Failed password for invalid user system from 182.52.229.178 port 55732 ssh2
Feb 13 15:21:47 Server sshd[27262]: Connection closed by invalid user system 182.52.229.178 port 55732 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=182.52.229.178
2020-02-13 23:13:49
115.159.185.71 attackspambots
Feb 13 15:49:57 MK-Soft-VM8 sshd[22715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.185.71 
Feb 13 15:50:00 MK-Soft-VM8 sshd[22715]: Failed password for invalid user stage from 115.159.185.71 port 60968 ssh2
...
2020-02-13 23:14:50
203.147.71.11 attackspambots
(imapd) Failed IMAP login from 203.147.71.11 (NC/New Caledonia/host-203-147-71-11.h24.canl.nc): 1 in the last 3600 secs
2020-02-13 23:51:30
204.12.102.38 spam
MARRE de ces ORDURES de FILS de PUTES, avec la complicité de SOUS MERDES comme tucows.com et hostmysite.com qui POLLUENT la Planète par DIX POURRIELS par jour pour du SEXE sur des listes VOLÉES on ne sait où mais SANS notre accord, à condamner selon la législation Européenne à 750 € par SPAM émis !
https://www.mywot.com/scorecard/automatedfiling.com
https://www.mywot.com/scorecard/safesecureweb.com
https://www.mywot.com/scorecard/quickdateloversfinder.com
https://www.mywot.com/scorecard/quickdateladiesfinder.com
https://www.mywot.com/scorecard/honeyadultsfinder.com
https://www.mywot.com/scorecard/tucows.com
https://www.mywot.com/scorecard/ntirety.com
https://en.asytech.cn/check-ip/204.12.102.38
info@automatedfiling.com which send as usual to :
https://quickdateloversfinder.com/mwoirzmytgwlwhw%3Ft%3Dsssh&sa=D&sntz=1&usg=AFQjCNGmyUXvyNHS-Zi5EZn1NbKHoi4HWg
2020-02-13 23:44:58
222.186.30.218 attackspam
13.02.2020 15:30:58 SSH access blocked by firewall
2020-02-13 23:38:23
103.255.5.117 attackbotsspam
Feb 13 14:48:07  exim[29137]: [1\49] 1j2Eqa-0007Zx-FO H=(zong.com.pk) [103.255.5.117] F= rejected after DATA: This message scored 19.0 spam points.
2020-02-13 23:46:11
35.198.115.127 attack
ICMP MH Probe, Scan /Distributed -
2020-02-13 23:26:37
192.41.162.30 attack
of course, I dropped subnet 192.41.162.0/24 after their attempts on port 53. Sorry man, I don't need you :)
2020-02-13 23:31:23
35.200.229.53 attackspam
ICMP MH Probe, Scan /Distributed -
2020-02-13 23:18:42
80.48.99.151 attackspambots
1581602171 - 02/13/2020 20:56:11 Host: 80.48.99.151/80.48.99.151 Port: 23 TCP Blocked
...
2020-02-13 23:32:21
62.106.27.103 attackbotsspam
firewall-block, port(s): 23/tcp
2020-02-13 23:17:07

Recently Reported IPs

82.39.200.65 175.48.27.18 173.215.195.1 178.68.181.92
10.10.114.42 115.84.116.98 183.240.56.54 121.177.236.207
134.209.196.3 50.89.234.231 10.0.17.60 27.109.113.196
128.199.139.113 10.21.133.225 172.58.157.209 85.221.154.30
11.90.0.247 18.209.254.176 10.184.10.177 134.209.69.15