Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Singapore

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
139.162.111.98 spamattack
Unauthorized connection attempt detected from IP address 139.162.111.98 to port 8080
2020-11-19 17:15:48
139.162.116.133 attack
Malicious brute force vulnerability hacking attacks
2020-10-14 07:39:12
139.162.122.110 attackbots
Oct 12 19:13:22 ssh2 sshd[79460]: Connection from 139.162.122.110 port 52476 on 192.240.101.3 port 22
Oct 12 19:13:23 ssh2 sshd[79460]: Invalid user  from 139.162.122.110 port 52476
Oct 12 19:13:23 ssh2 sshd[79460]: Failed none for invalid user  from 139.162.122.110 port 52476 ssh2
...
2020-10-13 03:35:33
139.162.122.110 attack
Oct 12 09:33:08 nopemail auth.info sshd[1766]: Invalid user  from 139.162.122.110 port 35870
...
2020-10-12 19:07:41
139.162.147.137 attack
Unauthorized connection attempt detected from IP address 139.162.147.137 to port 139
2020-10-12 06:11:53
139.162.147.137 attackspam
Unauthorized connection attempt detected from IP address 139.162.147.137 to port 139
2020-10-11 22:21:03
139.162.147.137 attackspambots
Use Brute-Force
2020-10-11 14:17:25
139.162.147.137 attack
Use Brute-Force
2020-10-11 07:40:30
139.162.122.110 attackbots
Oct  7 19:35:03 nopemail auth.info sshd[3958]: Invalid user  from 139.162.122.110 port 47128
...
2020-10-08 01:50:52
139.162.122.110 attackbots
SSH login attempts.
2020-10-07 17:59:19
139.162.112.248 attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-10-06 04:15:47
139.162.114.154 attackbots
 TCP (SYN) 139.162.114.154:55866 -> port 80, len 40
2020-10-06 03:23:05
139.162.121.165 attack
 TCP (SYN) 139.162.121.165:60337 -> port 8080, len 44
2020-10-06 02:06:39
139.162.112.248 attackbotsspam
scans 2 times in preceeding hours on the ports (in chronological order) 8080 8080
2020-10-05 20:15:14
139.162.114.154 attackbots
Blocked by Sophos UTM Network Protection . /    / proto=6  .  srcport=45266  .  dstport=80 HTTP  .     (890)
2020-10-05 19:16:07
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.162.1.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28304
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.162.1.108.			IN	A

;; AUTHORITY SECTION:
.			415	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:05:50 CST 2022
;; MSG SIZE  rcvd: 106
Host info
108.1.162.139.in-addr.arpa domain name pointer mf-magento-web03.singapore.linode.mobilefun.co.uk.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
108.1.162.139.in-addr.arpa	name = mf-magento-web03.singapore.linode.mobilefun.co.uk.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
83.234.218.38 attack
Unauthorized connection attempt detected from IP address 83.234.218.38 to port 8080
2020-01-04 09:06:42
220.200.165.110 attackbotsspam
Unauthorized connection attempt detected from IP address 220.200.165.110 to port 8888
2020-01-04 08:48:15
218.200.20.226 attackbotsspam
Unauthorized connection attempt detected from IP address 218.200.20.226 to port 1433
2020-01-04 08:49:18
27.16.221.170 attackbotsspam
Unauthorized connection attempt detected from IP address 27.16.221.170 to port 8118
2020-01-04 09:11:04
124.160.236.243 attackbots
Unauthorized connection attempt detected from IP address 124.160.236.243 to port 8118
2020-01-04 08:55:40
120.77.60.120 attack
Unauthorized connection attempt detected from IP address 120.77.60.120 to port 1433
2020-01-04 08:59:50
164.52.24.177 attackbots
Unauthorized connection attempt detected from IP address 164.52.24.177 to port 1099
2020-01-04 08:54:26
60.247.24.50 attackbots
Unauthorized connection attempt detected from IP address 60.247.24.50 to port 1433
2020-01-04 09:07:41
222.94.212.14 attackbotsspam
Unauthorized connection attempt detected from IP address 222.94.212.14 to port 8123
2020-01-04 08:46:20
1.192.217.66 attackbotsspam
Unauthorized connection attempt detected from IP address 1.192.217.66 to port 445
2020-01-04 08:44:25
47.104.192.106 attackbots
Unauthorized connection attempt detected from IP address 47.104.192.106 to port 23
2020-01-04 08:40:33
111.224.220.179 attackbots
Unauthorized connection attempt detected from IP address 111.224.220.179 to port 8123
2020-01-04 08:34:27
42.62.12.54 attackbotsspam
51.158.173.243 42.62.12.54 - - [03/Jan/2020:23:21:29 +0000] "GET /TP/public/index.php HTTP/1.1" 404 0 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.0;en-US; rv:1.9.2) Gecko/20100115 Firefox/3.6)"
51.158.173.243 42.62.12.54 - - [03/Jan/2020:23:21:29 +0000] "GET /TP/index.php HTTP/1.1" 404 0 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.0;en-US; rv:1.9.2) Gecko/20100115 Firefox/3.6)"
...
2020-01-04 09:09:08
106.75.2.200 attackbots
Unauthorized connection attempt detected from IP address 106.75.2.200 to port 6000
2020-01-04 09:05:25
27.224.136.233 attack
Unauthorized connection attempt detected from IP address 27.224.136.233 to port 8899
2020-01-04 08:42:49

Recently Reported IPs

118.212.105.88 139.162.1.209 139.159.99.34 139.162.1.237
139.162.1.4 139.162.1.73 139.162.10.121 139.162.1.43
139.162.10.125 139.162.10.128 139.162.10.153 118.212.105.9
139.162.10.170 139.162.10.174 139.162.10.182 139.162.10.199
139.162.10.231 139.162.10.22 139.162.10.68 139.162.10.72