Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: TDC

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.68.rc1.el6_10.3 <<>> 139.145.143.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43271
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.145.143.122.		IN	A

;; AUTHORITY SECTION:
.			10800	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020042101 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 100.100.2.138#53(100.100.2.138)
;; WHEN: Wed Apr 22 07:41:57 2020
;; MSG SIZE  rcvd: 108

Host info
Host 122.143.145.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 122.143.145.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
162.243.10.64 attackspam
Mar  5 14:35:09 web1 sshd\[31047\]: Invalid user teamsystem from 162.243.10.64
Mar  5 14:35:09 web1 sshd\[31047\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.10.64
Mar  5 14:35:12 web1 sshd\[31047\]: Failed password for invalid user teamsystem from 162.243.10.64 port 54162 ssh2
Mar  5 14:38:57 web1 sshd\[31384\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.10.64  user=sys
Mar  5 14:38:59 web1 sshd\[31384\]: Failed password for sys from 162.243.10.64 port 39080 ssh2
2020-03-06 08:43:07
86.126.47.155 attack
Honeypot attack, port: 5555, PTR: 86-126-47-155.craiova.rdsnet.ro.
2020-03-06 09:21:50
14.162.93.254 attackspambots
Mar  3 05:27:15 h2022099 sshd[573]: Address 14.162.93.254 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Mar  3 05:27:15 h2022099 sshd[573]: Invalid user ibpzxz from 14.162.93.254
Mar  3 05:27:15 h2022099 sshd[573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.162.93.254 
Mar  3 05:27:17 h2022099 sshd[573]: Failed password for invalid user ibpzxz from 14.162.93.254 port 57016 ssh2
Mar  3 05:27:18 h2022099 sshd[573]: Received disconnect from 14.162.93.254: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.162.93.254
2020-03-06 09:13:31
31.165.226.134 attackspambots
2020-03-0522:55:581j9yTF-0002mv-Pa\<=verena@rs-solution.chH=\(localhost\)[183.89.214.132]:47219P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=2268id=686DDB88835779CA16135AE2164EB742@rs-solution.chT="Wouldliketogettoknowyou"foralibadri065@gmail.comalimhmoad102@gmail.com2020-03-0522:55:481j9yT5-0002lv-DP\<=verena@rs-solution.chH=\(localhost\)[123.20.159.7]:33268P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=2296id=7D78CE9D96426CDF03064FF703285D03@rs-solution.chT="Wishtoexploreyou"foramosian643@gmail.comclaudiacanales5702@gmail.com2020-03-0522:56:131j9yTU-0002oV-PF\<=verena@rs-solution.chH=\(localhost\)[156.223.150.93]:38908P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=2284id=1114A2F1FA2E00B36F6A239B6F3D206E@rs-solution.chT="Justsimplychosetogetacquaintedwithyou"forrichardscolt8337@gmail.comcorbin_jason@live.ca2020-03-0522:55:311j9ySo-0002kO-I0\<=verena@rs-solution.chH=
2020-03-06 08:57:31
218.92.0.212 attack
Mar  6 06:49:02 areeb-Workstation sshd[15527]: Failed password for root from 218.92.0.212 port 35900 ssh2
Mar  6 06:49:05 areeb-Workstation sshd[15527]: Failed password for root from 218.92.0.212 port 35900 ssh2
...
2020-03-06 09:23:47
153.139.239.41 attackbots
Mar  5 14:56:01 hanapaa sshd\[22672\]: Invalid user admin from 153.139.239.41
Mar  5 14:56:01 hanapaa sshd\[22672\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.139.239.41
Mar  5 14:56:03 hanapaa sshd\[22672\]: Failed password for invalid user admin from 153.139.239.41 port 60388 ssh2
Mar  5 15:05:50 hanapaa sshd\[23483\]: Invalid user appimgr from 153.139.239.41
Mar  5 15:05:50 hanapaa sshd\[23483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.139.239.41
2020-03-06 09:21:18
88.202.190.158 attackbotsspam
" "
2020-03-06 09:24:06
186.251.197.121 attackbots
Automatic report - Port Scan Attack
2020-03-06 09:17:43
125.160.90.206 attack
[Fri Mar 06 04:55:53.414029 2020] [:error] [pid 26744:tid 139934444496640] [client 125.160.90.206:60552] [client 125.160.90.206] ModSecurity: Access denied with code 403 (phase 2). Pattern match "[oOcC]:\\\\d+:\".+?\":\\\\d+:{.*}" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf"] [line "406"] [id "933170"] [msg "PHP Injection Attack: Serialized Object Injection"] [data "Matched Data: O:21:\\x22JDatabaseDriverMysqli\\x22:3:{s:2:\\x22fc\\x22;O:17:\\x22JSimplepieFactory\\x22:0:{}s:21:\\x22\\x5c0\\x5c0\\x5c0disconnectHandlers\\x22;a:1:{i:0;a:2:{i:0;O:9:\\x22SimplePie\\x22:5:{s:8:\\x22sanitize\\x22;O:20:\\x22JDatabaseDriverMysql\\x22:0:{}s:8:\\x22feed_url\\x22;s:5946:\\x22eval(base64_decode('JGNoZWNrID0gJF9TRVJWRVJbJ0RPQ1VNRU5UX1JPT1QnXSAuICIvdG1wL3Z1bG4yLnBocCIgOwokZnA9Zm9wZW4oIiRjaGVjayIsIncrIik7CmZ3cml0ZSgkZnAsYmFzZTY0X2RlY29kZSgnUEhScGRHeGxQbFoxYkc0aElTQndZWFJqYUNCcGRDQk9iM2NoUEM5MGFYUnNaVD..."] [severity
...
2020-03-06 09:18:00
92.97.211.244 attackspambots
Brute force attack against VPN service
2020-03-06 09:11:11
223.197.125.10 attackbots
Invalid user liaowenjie from 223.197.125.10 port 34690
2020-03-06 08:42:53
110.35.173.2 attack
fail2ban
2020-03-06 09:08:32
61.75.225.35 attackspambots
Honeypot attack, port: 81, PTR: PTR record not found
2020-03-06 08:50:55
118.174.219.114 attackspam
Mar  5 17:28:21 NPSTNNYC01T sshd[8823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.174.219.114
Mar  5 17:28:23 NPSTNNYC01T sshd[8823]: Failed password for invalid user mysql from 118.174.219.114 port 45550 ssh2
Mar  5 17:32:12 NPSTNNYC01T sshd[9052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.174.219.114
...
2020-03-06 08:51:48
69.94.155.176 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-06 09:16:25

Recently Reported IPs

62.154.45.56 160.7.236.14 156.220.88.44 47.18.42.53
72.47.37.63 75.181.8.188 84.183.32.80 126.33.84.83
52.240.207.105 122.231.76.61 58.48.255.42 208.250.173.145
69.220.189.94 198.237.138.200 177.19.64.120 111.187.53.82
187.62.22.167 119.224.22.110 158.109.3.158 154.236.81.181