Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Frankfurt am Main

Region: Hesse

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
139.162.169.51 attack
[Fri Jun 19 17:11:20 2020] - DDoS Attack From IP: 139.162.169.51 Port: 40381
2020-07-16 20:08:35
139.162.169.51 attack
[Fri Jun 19 17:11:22 2020] - DDoS Attack From IP: 139.162.169.51 Port: 40381
2020-07-13 02:45:55
139.162.169.51 attack
 TCP (SYN) 139.162.169.51:47956 -> port 4567, len 44
2020-07-10 17:53:27
139.162.169.51 attackspambots
[Fri Jun 19 17:11:25 2020] - DDoS Attack From IP: 139.162.169.51 Port: 40381
2020-07-08 22:15:30
139.162.169.70 attackspambots
spam
2020-01-22 16:49:34
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.162.169.120
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20210
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.162.169.120.		IN	A

;; AUTHORITY SECTION:
.			199	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020110101 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 183.60.82.98#53(183.60.82.98)
;; WHEN: Mon Nov 02 03:04:22 CST 2020
;; MSG SIZE  rcvd: 119

Host info
120.169.162.139.in-addr.arpa domain name pointer li1486-120.members.linode.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
120.169.162.139.in-addr.arpa	name = li1486-120.members.linode.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
52.202.187.239 attack
Aug  6 08:45:08 marvibiene sshd[18585]: Failed password for root from 52.202.187.239 port 58072 ssh2
Aug  6 08:58:07 marvibiene sshd[19291]: Failed password for root from 52.202.187.239 port 40662 ssh2
2020-08-06 15:43:51
84.52.85.204 attack
Aug  6 08:19:58 PorscheCustomer sshd[18453]: Failed password for root from 84.52.85.204 port 52876 ssh2
Aug  6 08:22:38 PorscheCustomer sshd[18531]: Failed password for root from 84.52.85.204 port 35800 ssh2
...
2020-08-06 15:43:33
23.97.180.45 attack
2020-08-06T01:23:09.219788mail.thespaminator.com sshd[21974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.97.180.45  user=root
2020-08-06T01:23:11.216079mail.thespaminator.com sshd[21974]: Failed password for root from 23.97.180.45 port 58009 ssh2
...
2020-08-06 15:39:34
102.65.149.117 attackspam
Aug  6 09:10:15 hosting sshd[17618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102-65-149-117.dsl.web.africa  user=root
Aug  6 09:10:18 hosting sshd[17618]: Failed password for root from 102.65.149.117 port 39160 ssh2
...
2020-08-06 15:12:38
34.125.159.230 attackbots
Host Scan
2020-08-06 15:41:14
190.202.233.169 attackspambots
Icarus honeypot on github
2020-08-06 15:37:15
123.157.78.171 attackbotsspam
Aug  5 22:40:52 mockhub sshd[6653]: Failed password for root from 123.157.78.171 port 50890 ssh2
...
2020-08-06 15:39:17
193.112.44.102 attackbotsspam
Failed password for root from 193.112.44.102 port 36526 ssh2
2020-08-06 15:03:09
173.44.201.16 spam
sends spam emails
2020-08-06 15:40:25
200.41.86.59 attack
Aug  6 07:00:44 h2646465 sshd[31274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.41.86.59  user=root
Aug  6 07:00:46 h2646465 sshd[31274]: Failed password for root from 200.41.86.59 port 37980 ssh2
Aug  6 07:12:25 h2646465 sshd[32638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.41.86.59  user=root
Aug  6 07:12:27 h2646465 sshd[32638]: Failed password for root from 200.41.86.59 port 39830 ssh2
Aug  6 07:15:56 h2646465 sshd[789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.41.86.59  user=root
Aug  6 07:15:58 h2646465 sshd[789]: Failed password for root from 200.41.86.59 port 37900 ssh2
Aug  6 07:19:43 h2646465 sshd[976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.41.86.59  user=root
Aug  6 07:19:45 h2646465 sshd[976]: Failed password for root from 200.41.86.59 port 35984 ssh2
Aug  6 07:23:14 h2646465 sshd[1701]: pam_uni
2020-08-06 15:32:58
51.75.16.206 attackbots
Automatic report - Banned IP Access
2020-08-06 15:25:27
45.77.185.161 attackspambots
Host Scan
2020-08-06 15:37:51
222.186.180.130 attack
2020-08-06T10:07:11.487192lavrinenko.info sshd[17902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130  user=root
2020-08-06T10:07:14.069049lavrinenko.info sshd[17902]: Failed password for root from 222.186.180.130 port 64818 ssh2
2020-08-06T10:07:11.487192lavrinenko.info sshd[17902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130  user=root
2020-08-06T10:07:14.069049lavrinenko.info sshd[17902]: Failed password for root from 222.186.180.130 port 64818 ssh2
2020-08-06T10:07:17.572487lavrinenko.info sshd[17902]: Failed password for root from 222.186.180.130 port 64818 ssh2
...
2020-08-06 15:08:12
138.0.67.22 attack
Unauthorized connection attempt detected from IP address 138.0.67.22 to port 23
2020-08-06 15:17:18
218.92.0.133 attackspam
Aug  6 09:34:01 nextcloud sshd\[16663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.133  user=root
Aug  6 09:34:03 nextcloud sshd\[16663\]: Failed password for root from 218.92.0.133 port 19417 ssh2
Aug  6 09:34:05 nextcloud sshd\[16663\]: Failed password for root from 218.92.0.133 port 19417 ssh2
2020-08-06 15:43:02

Recently Reported IPs

195.117.96.16 176.59.42.142 80.237.119.228 183.63.253.133
70.94.148.93 45.135.187.116 172.93.111.146 51.15.59.108
113.185.47.213 46.114.111.62 46.114.104.129 185.63.153.86
157.245.84.86 175.140.235.21 221.200.81.249 174.197.195.84
199.232.77.2 114.222.152.221 151.192.229.157 60.225.74.15