Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.145.5.102
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35679
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.145.5.102.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021202 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 07:38:56 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 102.5.145.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 102.5.145.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
125.37.161.82 attack
Automated reporting of FTP Brute Force
2019-09-27 21:25:35
14.63.174.149 attack
Sep 27 13:35:24 venus sshd\[18904\]: Invalid user sinusbot from 14.63.174.149 port 55390
Sep 27 13:35:24 venus sshd\[18904\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.174.149
Sep 27 13:35:26 venus sshd\[18904\]: Failed password for invalid user sinusbot from 14.63.174.149 port 55390 ssh2
...
2019-09-27 22:03:29
125.71.164.161 attack
Automated reporting of FTP Brute Force
2019-09-27 21:43:36
37.193.108.101 attackspam
Sep 27 14:00:24 web8 sshd\[9091\]: Invalid user postgres from 37.193.108.101
Sep 27 14:00:24 web8 sshd\[9091\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.193.108.101
Sep 27 14:00:26 web8 sshd\[9091\]: Failed password for invalid user postgres from 37.193.108.101 port 59338 ssh2
Sep 27 14:05:10 web8 sshd\[11313\]: Invalid user yy from 37.193.108.101
Sep 27 14:05:10 web8 sshd\[11313\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.193.108.101
2019-09-27 22:07:32
129.28.166.212 attack
2019-09-27T16:36:54.959852tmaserv sshd\[489\]: Invalid user paco from 129.28.166.212 port 59448
2019-09-27T16:36:54.970034tmaserv sshd\[489\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.166.212
2019-09-27T16:36:56.725484tmaserv sshd\[489\]: Failed password for invalid user paco from 129.28.166.212 port 59448 ssh2
2019-09-27T16:42:47.673858tmaserv sshd\[770\]: Invalid user test from 129.28.166.212 port 34818
2019-09-27T16:42:47.678532tmaserv sshd\[770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.166.212
2019-09-27T16:42:49.557830tmaserv sshd\[770\]: Failed password for invalid user test from 129.28.166.212 port 34818 ssh2
...
2019-09-27 21:55:01
51.159.0.165 attack
[FriSep2715:35:03.7605382019][:error][pid4843:tid46955191375616][client51.159.0.165:51310][client51.159.0.165]ModSecurity:Accessdeniedwithcode403\(phase2\).Matchof"rx\(MSWebServicesClientProtocol\|WormlyBot\|webauth@cmcm\\\\\\\\.com\)"against"REQUEST_HEADERS:User-Agent"required.[file"/usr/local/apache.ea3/conf/modsec_rules/20_asl_useragents.conf"][line"395"][id"397989"][rev"1"][msg"Atomicorp.comWAFRules:MSIE6.0detected\(DisableifyouwanttoallowMSIE6\)"][severity"WARNING"][hostname"bg-sa.ch"][uri"/"][unique_id"XY4QB0whv0kL8DQEigCykwAAAAM"][FriSep2715:35:04.0172072019][:error][pid4911:tid46955302553344][client51.159.0.165:52170][client51.159.0.165]ModSecurity:Accessdeniedwithcode403\(phase2\).Matchof"rx\(MSWebServicesClientProtocol\|WormlyBot\|webauth@cmcm\\\\\\\\.com\)"against"REQUEST_HEADERS:User-Agent"required.[file"/usr/local/apache.ea3/conf/modsec_rules/20_asl_useragents.conf"][line"395"][id"397989"][rev"1"][msg"Atomicorp.comWAFRules:MSIE6.0detected\(Disableifyouwanttoallo
2019-09-27 21:54:20
58.244.40.200 attackbotsspam
Automated reporting of FTP Brute Force
2019-09-27 22:07:03
70.45.243.146 attackspambots
Sep 27 14:14:51 bouncer sshd\[22795\]: Invalid user pmoran from 70.45.243.146 port 37386
Sep 27 14:14:51 bouncer sshd\[22795\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.45.243.146 
Sep 27 14:14:53 bouncer sshd\[22795\]: Failed password for invalid user pmoran from 70.45.243.146 port 37386 ssh2
...
2019-09-27 21:20:14
149.56.120.200 attack
Sep 27 14:14:58 srv206 sshd[27821]: Invalid user www from 149.56.120.200
...
2019-09-27 21:18:34
46.38.144.17 attackspambots
Sep 27 14:50:05 mail postfix/smtpd\[21350\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep 27 14:51:22 mail postfix/smtpd\[19316\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep 27 14:52:38 mail postfix/smtpd\[21572\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep 27 15:23:22 mail postfix/smtpd\[23409\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-09-27 21:27:51
163.172.207.104 attack
\[2019-09-27 09:44:59\] SECURITY\[2006\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-27T09:44:59.516-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="36011972592277524",SessionID="0x7f1e1c2bed58",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/53728",ACLName="no_extension_match"
\[2019-09-27 09:49:39\] SECURITY\[2006\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-27T09:49:39.352-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="37011972592277524",SessionID="0x7f1e1c8be8a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/62510",ACLName="no_extension_match"
\[2019-09-27 09:53:49\] SECURITY\[2006\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-27T09:53:49.312-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="38011972592277524",SessionID="0x7f1e1c8be8a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/50768",ACL
2019-09-27 22:10:19
54.39.193.26 attack
Sep 27 09:30:24 plusreed sshd[16322]: Invalid user claudio from 54.39.193.26
...
2019-09-27 21:31:40
139.198.122.76 attackspambots
2019-09-27T16:12:41.188054tmaserv sshd\[28811\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.122.76
2019-09-27T16:12:43.469511tmaserv sshd\[28811\]: Failed password for invalid user siphiwo from 139.198.122.76 port 36672 ssh2
2019-09-27T16:25:59.416912tmaserv sshd\[29681\]: Invalid user awghamdany from 139.198.122.76 port 33952
2019-09-27T16:25:59.424730tmaserv sshd\[29681\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.122.76
2019-09-27T16:26:01.254824tmaserv sshd\[29681\]: Failed password for invalid user awghamdany from 139.198.122.76 port 33952 ssh2
2019-09-27T16:32:35.182787tmaserv sshd\[32634\]: Invalid user inma from 139.198.122.76 port 46704
...
2019-09-27 21:45:19
209.99.134.240 attackbotsspam
09/27/2019-14:14:12.341575 209.99.134.240 Protocol: 6 ET DROP Spamhaus DROP Listed Traffic Inbound group 34
2019-09-27 21:58:28
51.68.123.192 attack
Sep 27 03:15:27 lcdev sshd\[29279\]: Invalid user ksrkm from 51.68.123.192
Sep 27 03:15:27 lcdev sshd\[29279\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.ip-51-68-123.eu
Sep 27 03:15:29 lcdev sshd\[29279\]: Failed password for invalid user ksrkm from 51.68.123.192 port 56914 ssh2
Sep 27 03:19:27 lcdev sshd\[29661\]: Invalid user euser from 51.68.123.192
Sep 27 03:19:27 lcdev sshd\[29661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.ip-51-68-123.eu
2019-09-27 21:20:50

Recently Reported IPs

96.243.152.122 54.184.162.176 3.181.177.183 101.233.134.56
40.165.186.189 131.83.153.0 14.39.16.219 89.132.128.20
148.177.216.40 56.169.106.70 27.72.96.121 252.182.206.62
40.126.64.213 123.215.41.53 184.144.200.94 90.155.200.10
242.138.254.6 228.104.105.232 86.194.87.133 93.166.146.62