Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Frankfurt am Main

Region: Hesse

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.162.165.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60654
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.162.165.107.		IN	A

;; AUTHORITY SECTION:
.			597	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:07:39 CST 2022
;; MSG SIZE  rcvd: 108
Host info
107.165.162.139.in-addr.arpa domain name pointer li1482-107.members.linode.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
107.165.162.139.in-addr.arpa	name = li1482-107.members.linode.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
112.17.79.156 attack
Scanned 325 unique addresses for 2 unique ports in 24 hours (ports 15021,29871)
2020-06-16 03:01:47
110.137.103.201 attackbots
1592223924 - 06/15/2020 14:25:24 Host: 110.137.103.201/110.137.103.201 Port: 445 TCP Blocked
2020-06-16 02:57:51
106.13.119.163 attack
Jun 15 10:20:20 ny01 sshd[8884]: Failed password for root from 106.13.119.163 port 53356 ssh2
Jun 15 10:22:37 ny01 sshd[9135]: Failed password for root from 106.13.119.163 port 47462 ssh2
2020-06-16 03:15:47
91.103.252.212 attack
SpamScore above: 10.0
2020-06-16 03:01:26
52.188.16.243 attackspambots
Fail2Ban Ban Triggered
HTTP SQL Injection Attempt
2020-06-16 02:51:26
130.105.63.214 attackspam
Unauthorized connection attempt from IP address 130.105.63.214 on Port 445(SMB)
2020-06-16 02:54:02
176.114.20.200 attackspam
Unauthorized connection attempt from IP address 176.114.20.200 on Port 445(SMB)
2020-06-16 03:08:50
165.22.33.32 attackspambots
Jun 15 23:40:46 localhost sshd[30284]: Invalid user copy from 165.22.33.32 port 57530
...
2020-06-16 02:46:30
64.145.79.153 attackbots
Fail2Ban Ban Triggered
2020-06-16 02:37:40
190.79.118.180 attack
1592223322 - 06/15/2020 14:15:22 Host: 190.79.118.180/190.79.118.180 Port: 445 TCP Blocked
2020-06-16 02:50:59
181.129.161.28 attackspambots
Jun 15 18:54:15 rush sshd[9692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.129.161.28
Jun 15 18:54:17 rush sshd[9692]: Failed password for invalid user imc from 181.129.161.28 port 49916 ssh2
Jun 15 18:57:47 rush sshd[9789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.129.161.28
...
2020-06-16 03:10:32
41.226.4.95 attack
Unauthorized connection attempt from IP address 41.226.4.95 on Port 445(SMB)
2020-06-16 02:43:21
93.56.160.103 attack
Unauthorized connection attempt from IP address 93.56.160.103 on Port 445(SMB)
2020-06-16 03:11:27
45.9.47.42 attack
Unauthorized connection attempt from IP address 45.9.47.42 on Port 445(SMB)
2020-06-16 02:39:48
183.82.121.34 attackspambots
2020-06-14 17:16:48 server sshd[99766]: Failed password for invalid user arts from 183.82.121.34 port 35846 ssh2
2020-06-16 03:10:07

Recently Reported IPs

139.162.165.133 118.212.107.150 139.162.165.161 139.162.165.212
139.162.165.247 139.162.165.23 139.162.166.102 139.162.165.241
139.162.166.88 139.162.166.31 139.162.166.141 118.212.107.152
139.162.166.98 139.162.167.54 139.162.167.75 139.162.168.120
139.162.168.143 139.162.168.206 139.162.168.167 139.162.168.41