Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: London

Region: England

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
139.162.196.96 attackbots
Unauthorized connection attempt detected from IP address 139.162.196.96 to port 7657 [J]
2020-02-05 19:58:11
139.162.196.96 attackspambots
Unauthorized connection attempt detected from IP address 139.162.196.96 to port 102 [J]
2020-01-30 23:48:26
139.162.196.96 attackspambots
Unauthorized connection attempt detected from IP address 139.162.196.96 to port 22 [J]
2020-01-13 00:28:13
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.162.196.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17249
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.162.196.21.			IN	A

;; AUTHORITY SECTION:
.			594	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 75 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:08:25 CST 2022
;; MSG SIZE  rcvd: 107
Host info
21.196.162.139.in-addr.arpa domain name pointer li1359-21.members.linode.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.196.162.139.in-addr.arpa	name = li1359-21.members.linode.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
217.182.169.183 attackspam
SSH login attempts.
2020-10-06 03:24:51
92.184.98.237 attack
ece-12 : Blocage des caractères return, carriage return, ...=>/%3C?php%20echo%20$item-%3Ethumb;%20?%3E(>)
2020-10-06 03:38:48
51.178.17.63 attackbots
(sshd) Failed SSH login from 51.178.17.63 (FR/France/63.ip-51-178-17.eu): 5 in the last 3600 secs
2020-10-06 03:47:58
58.229.114.170 attackbots
Brute-force attempt banned
2020-10-06 03:30:24
124.16.75.149 attackspam
Oct  5 18:09:04 sigma sshd\[2284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.16.75.149  user=rootOct  5 18:12:22 sigma sshd\[2491\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.16.75.149  user=root
...
2020-10-06 03:40:30
54.38.65.127 attackbots
[munged]::443 54.38.65.127 - - [05/Oct/2020:15:28:38 +0200] "POST /[munged]: HTTP/1.1" 200 6586 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-10-06 03:40:55
43.225.151.251 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-10-05T16:21:43Z and 2020-10-05T16:25:43Z
2020-10-06 03:43:51
104.248.63.30 attack
"$f2bV_matches"
2020-10-06 03:50:35
51.178.86.97 attack
Brute%20Force%20SSH
2020-10-06 03:41:16
116.73.99.95 attackbotsspam
DATE:2020-10-04 22:31:15, IP:116.73.99.95, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-10-06 03:32:49
112.85.42.180 attackbotsspam
Oct  5 20:53:23 nextcloud sshd\[3840\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.180  user=root
Oct  5 20:53:24 nextcloud sshd\[3840\]: Failed password for root from 112.85.42.180 port 41210 ssh2
Oct  5 20:53:28 nextcloud sshd\[3840\]: Failed password for root from 112.85.42.180 port 41210 ssh2
2020-10-06 03:43:38
141.101.105.132 attackbots
srv02 DDoS Malware Target(80:http) ..
2020-10-06 03:53:16
75.55.248.20 attackbotsspam
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-06 03:21:02
59.42.91.43 attackspambots
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-10-06 03:29:54
218.92.0.223 attack
Oct  5 21:08:13 minden010 sshd[2245]: Failed password for root from 218.92.0.223 port 37268 ssh2
Oct  5 21:08:16 minden010 sshd[2245]: Failed password for root from 218.92.0.223 port 37268 ssh2
Oct  5 21:08:19 minden010 sshd[2245]: Failed password for root from 218.92.0.223 port 37268 ssh2
Oct  5 21:08:22 minden010 sshd[2245]: Failed password for root from 218.92.0.223 port 37268 ssh2
...
2020-10-06 03:52:54

Recently Reported IPs

139.162.196.160 139.162.196.78 139.162.197.150 139.162.196.12
139.162.197.232 139.162.195.127 139.162.195.198 118.212.107.182
139.162.197.240 139.162.198.156 139.162.198.212 139.162.197.238
139.162.198.185 139.162.198.195 139.162.2.96 139.162.2.76
139.162.2.110 139.162.2.234 139.162.20.119 139.162.20.109