Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Horten

Region: Vestfold

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: Altibox AS

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.164.158.185
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15834
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.164.158.185.		IN	A

;; AUTHORITY SECTION:
.			2966	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081300 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Aug 14 00:00:39 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 185.158.164.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 185.158.164.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
82.165.86.235 attack
MYH,DEF GET /wordpress/wp-admin/setup-config.php?step=1
2019-08-09 00:11:01
182.61.160.236 attack
Aug  8 16:23:42 debian sshd\[27673\]: Invalid user robin from 182.61.160.236 port 46918
Aug  8 16:23:42 debian sshd\[27673\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.160.236
...
2019-08-08 23:33:49
94.23.149.25 attackbotsspam
Aug  8 16:47:03 debian sshd\[28032\]: Invalid user ftpuser from 94.23.149.25 port 46302
Aug  8 16:47:03 debian sshd\[28032\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.149.25
...
2019-08-09 00:08:07
222.186.52.155 attackspam
Too many connections or unauthorized access detected from Arctic banned ip
2019-08-08 23:27:58
187.37.1.171 attackspambots
2019-08-08T15:33:37.881005abusebot-8.cloudsearch.cf sshd\[14371\]: Invalid user oracle from 187.37.1.171 port 57249
2019-08-09 00:03:49
178.32.202.101 attackbotsspam
2019-08-08 07:00:55 H=ip101.ip-178-32-202.eu (0001062d.neurosmart.icu) [178.32.202.101]:35400 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3) (https://www.spamhaus.org/sbl/query/SBLCSS)
2019-08-08 07:04:01 H=ip101.ip-178-32-202.eu (00471dd9.neurosmart.icu) [178.32.202.101]:33913 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3) (https://www.spamhaus.org/sbl/query/SBLCSS)
2019-08-08 07:04:01 H=ip101.ip-178-32-202.eu (00fcb0cb.neurosmart.icu) [178.32.202.101]:44458 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3) (https://www.spamhaus.org/sbl/query/SBLCSS)
...
2019-08-08 23:50:08
179.183.65.56 attackbots
Automatic report
2019-08-09 00:24:54
185.156.177.20 attack
scan z
2019-08-09 00:36:02
142.93.163.80 attackspam
Aug  8 14:43:41 mail sshd\[7731\]: Invalid user ts3 from 142.93.163.80
Aug  8 14:44:30 mail sshd\[7735\]: Invalid user ts3 from 142.93.163.80
Aug  8 14:45:17 mail sshd\[7741\]: Invalid user ts3 from 142.93.163.80
Aug  8 14:46:03 mail sshd\[7744\]: Invalid user ts3 from 142.93.163.80
Aug  8 14:46:28 mail sshd\[7747\]: Invalid user ts3 from 142.93.163.80
Aug  8 14:46:44 mail sshd\[7750\]: Invalid user ts3 from 142.93.163.80
Aug  8 14:47:01 mail sshd\[7753\]: Invalid user ts3 from 142.93.163.80
Aug  8 14:47:16 mail sshd\[7756\]: Invalid user ts3 from 142.93.163.80
Aug  8 14:47:32 mail sshd\[7759\]: Invalid user ts3 from 142.93.163.80
Aug  8 14:47:49 mail sshd\[7762\]: Invalid user ts3 from 142.93.163.80
2019-08-09 00:23:42
191.53.249.65 attackbots
Aug  8 14:00:21 xeon postfix/smtpd[53056]: warning: unknown[191.53.249.65]: SASL PLAIN authentication failed: authentication failure
2019-08-08 23:49:37
191.53.254.67 attack
Aug  8 14:00:17 xeon postfix/smtpd[53056]: warning: unknown[191.53.254.67]: SASL PLAIN authentication failed: authentication failure
2019-08-08 23:49:03
131.108.48.151 attackspambots
leo_www
2019-08-08 23:34:53
106.51.128.133 attackspambots
Aug  8 23:28:17 localhost sshd[11886]: Invalid user flanamacca from 106.51.128.133 port 44178
Aug  8 23:28:17 localhost sshd[11886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.128.133
Aug  8 23:28:17 localhost sshd[11886]: Invalid user flanamacca from 106.51.128.133 port 44178
Aug  8 23:28:19 localhost sshd[11886]: Failed password for invalid user flanamacca from 106.51.128.133 port 44178 ssh2
...
2019-08-09 00:06:53
178.128.42.36 attackspambots
Aug  8 15:01:26 [munged] sshd[8307]: Invalid user teamspeak from 178.128.42.36 port 50184
Aug  8 15:01:26 [munged] sshd[8307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.42.36
2019-08-09 00:43:39
201.76.183.234 attack
Unauthorized connection attempt from IP address 201.76.183.234 on Port 445(SMB)
2019-08-09 00:45:50

Recently Reported IPs

189.144.195.29 103.22.104.57 178.128.50.29 117.125.196.235
207.143.92.210 132.76.154.88 89.132.102.142 84.205.25.8
64.132.141.40 196.247.188.133 178.128.50.160 125.24.181.133
101.153.60.5 74.81.11.120 142.166.148.56 170.37.232.167
123.195.75.161 8.77.229.5 195.189.96.187 57.84.60.137