Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
139.162.214.192 spambotsattack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2023-02-18 16:15:46
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.162.214.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12862
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.162.214.9.			IN	A

;; AUTHORITY SECTION:
.			438	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 12:36:51 CST 2022
;; MSG SIZE  rcvd: 106
Host info
9.214.162.139.in-addr.arpa domain name pointer li1377-9.members.linode.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
9.214.162.139.in-addr.arpa	name = li1377-9.members.linode.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
187.101.121.231 attackspam
Caught in portsentry honeypot
2019-07-24 03:12:34
146.242.36.49 attackspam
ICMP MP Probe, Scan -
2019-07-24 03:51:51
112.85.42.179 attackspambots
2019-07-23T17:37:32.473958abusebot-8.cloudsearch.cf sshd\[1116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.179  user=root
2019-07-24 03:50:51
146.242.54.30 attack
ICMP MP Probe, Scan -
2019-07-24 03:33:37
146.242.62.0 attack
ICMP MP Probe, Scan -
2019-07-24 03:32:55
218.92.0.172 attackspam
2019-07-23T19:50:57.165118centos sshd\[28722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.172  user=root
2019-07-23T19:50:58.979117centos sshd\[28722\]: Failed password for root from 218.92.0.172 port 57960 ssh2
2019-07-23T19:51:01.843361centos sshd\[28722\]: Failed password for root from 218.92.0.172 port 57960 ssh2
2019-07-24 03:44:15
45.40.199.88 attackspam
Invalid user gitadmin from 45.40.199.88 port 56832
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.40.199.88
Failed password for invalid user gitadmin from 45.40.199.88 port 56832 ssh2
Invalid user akmal from 45.40.199.88 port 38528
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.40.199.88
2019-07-24 03:45:41
146.242.37.18 attackbotsspam
ICMP MP Probe, Scan -
2019-07-24 03:44:45
178.150.189.43 attack
3389BruteforceFW21
2019-07-24 03:15:25
119.196.83.18 attackbotsspam
Jul 23 06:31:27 debian sshd\[20012\]: Invalid user ranjit from 119.196.83.18 port 57662
Jul 23 06:31:27 debian sshd\[20012\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.196.83.18
Jul 23 06:31:29 debian sshd\[20012\]: Failed password for invalid user ranjit from 119.196.83.18 port 57662 ssh2
...
2019-07-24 03:14:05
51.77.146.136 attackbotsspam
Jul 23 21:35:20 * sshd[16736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.146.136
Jul 23 21:35:22 * sshd[16736]: Failed password for invalid user cai from 51.77.146.136 port 51202 ssh2
2019-07-24 03:42:10
146.242.54.19 attackspambots
ICMP MP Probe, Scan -
2019-07-24 03:35:09
34.66.251.228 attackbotsspam
Brute forcing Wordpress login
2019-07-24 03:14:56
146.242.54.0 attack
ICMP MP Probe, Scan -
2019-07-24 03:40:04
146.242.63.78 attackbotsspam
ICMP MP Probe, Scan -
2019-07-24 03:16:26

Recently Reported IPs

139.162.212.22 139.162.212.156 139.162.217.37 139.162.215.183
139.162.215.63 139.162.215.48 139.162.216.129 139.162.217.225
139.162.213.132 114.165.245.13 139.162.211.235 139.162.216.73
139.162.218.199 139.162.219.68 139.162.221.105 139.162.219.120
139.162.22.249 139.162.219.5 139.162.222.196 139.162.221.11