Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tokyo

Region: Tokyo

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: Linode, LLC

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
139.162.120.98 attackbots
Port scan denied
2020-08-31 17:07:44
139.162.120.98 attackspam
Port 22 Scan, PTR: None
2020-07-28 18:54:30
139.162.120.76 attackspambots
 TCP (SYN) 139.162.120.76:55075 -> port 81, len 44
2020-07-24 14:31:27
139.162.120.76 attack
81/tcp 81/tcp 81/tcp...
[2020-05-20/07-19]90pkt,1pt.(tcp)
2020-07-20 04:17:17
139.162.120.98 attackbots
 TCP (SYN) 139.162.120.98:38106 -> port 22, len 44
2020-07-11 22:41:35
139.162.120.98 attack
 TCP (SYN) 139.162.120.98:47473 -> port 22, len 44
2020-06-27 07:06:20
139.162.120.98 attack
unauthorized connection attempt
2020-06-26 18:11:37
139.162.120.98 attackspambots
Port scan denied
2020-06-21 01:23:08
139.162.120.98 attackspambots
Port 22 Scan, PTR: None
2020-05-30 21:52:52
139.162.120.98 attackbotsspam
SmallBizIT.US 1 packets to tcp(22)
2020-05-21 02:12:36
139.162.120.76 attackbots
[portscan] tcp/81 [alter-web/web-proxy]
*(RWIN=65535)(04301449)
2020-05-01 00:11:50
139.162.120.76 attackbots
firewall-block, port(s): 81/tcp
2020-04-20 01:59:31
139.162.120.98 attackspambots
22/tcp 22/tcp 22/tcp...
[2020-02-06/04-05]62pkt,1pt.(tcp)
2020-04-06 04:29:11
139.162.120.98 attackbots
22/tcp 22/tcp 22/tcp...
[2019-12-02/2020-02-01]60pkt,1pt.(tcp)
2020-02-01 22:48:26
139.162.120.98 attack
firewall-block, port(s): 22/tcp
2019-12-31 17:06:42
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.162.120.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60853
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.162.120.104.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019040400 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Fri Apr 05 00:21:01 +08 2019
;; MSG SIZE  rcvd: 119

Host info
104.120.162.139.in-addr.arpa domain name pointer scan-4.security.ipip.net.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
104.120.162.139.in-addr.arpa	name = scan-4.security.ipip.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
89.165.3.29 attackbotsspam
Honeypot attack, port: 445, PTR: adsl-89-165-3-29.sabanet.ir.
2020-03-28 22:13:51
220.132.9.183 attack
scan z
2020-03-28 22:31:02
200.80.235.154 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-28 22:03:06
110.43.208.244 attack
110.43.208.244 was recorded 5 times by 3 hosts attempting to connect to the following ports: 9100. Incident counter (4h, 24h, all-time): 5, 9, 439
2020-03-28 21:52:46
45.232.73.83 attackspambots
Mar 28 14:17:18 vps sshd[289823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.232.73.83
Mar 28 14:17:20 vps sshd[289823]: Failed password for invalid user bau from 45.232.73.83 port 54128 ssh2
Mar 28 14:20:20 vps sshd[307977]: Invalid user rij from 45.232.73.83 port 38882
Mar 28 14:20:20 vps sshd[307977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.232.73.83
Mar 28 14:20:22 vps sshd[307977]: Failed password for invalid user rij from 45.232.73.83 port 38882 ssh2
...
2020-03-28 22:20:59
78.128.29.46 attack
Automatic report - Port Scan Attack
2020-03-28 21:45:39
95.128.137.176 attack
Mar 28 14:50:24 mout sshd[26959]: Invalid user dexter from 95.128.137.176 port 33111
2020-03-28 22:18:55
45.166.64.43 attackspam
Unauthorized connection attempt detected from IP address 45.166.64.43 to port 23
2020-03-28 22:09:57
202.62.107.90 attack
Unauthorized connection attempt detected from IP address 202.62.107.90 to port 445
2020-03-28 21:50:01
122.51.27.99 attack
SSH invalid-user multiple login try
2020-03-28 21:43:30
81.180.68.232 attack
DATE:2020-03-28 13:40:15, IP:81.180.68.232, PORT:5900 VNC brute force auth on honeypot server (epe-honey1-hq)
2020-03-28 22:33:50
112.145.106.40 attack
Honeypot attack, port: 5555, PTR: PTR record not found
2020-03-28 22:20:07
2.32.255.40 attackbotsspam
Mar 28 13:44:28 vps647732 sshd[27631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.32.255.40
...
2020-03-28 22:19:47
63.41.9.207 attack
SSH login attempts brute force.
2020-03-28 22:20:45
51.178.52.185 attack
Invalid user deploy from 51.178.52.185 port 47616
2020-03-28 22:01:51

Recently Reported IPs

221.201.243.14 185.53.88.122 118.24.123.153 103.63.236.46
198.23.189.18 125.224.25.21 118.89.106.252 119.29.2.157
83.234.8.214 78.94.181.182 14.116.251.199 107.170.204.25
121.146.117.94 119.29.11.100 118.25.62.242 37.32.120.130
80.229.28.86 116.234.39.28 93.159.154.206 185.176.221.164