Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom of Great Britain and Northern Ireland (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.166.114.156
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28141
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.166.114.156.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012500 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 01:37:26 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 156.114.166.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 156.114.166.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.98.200.167 attackspam
Triggered by Fail2Ban at Ares web server
2020-05-10 21:45:19
186.59.162.48 attackbotsspam
php WP PHPmyadamin ABUSE blocked for 12h
2020-05-10 21:28:29
167.114.98.229 attackspam
May 10 15:16:27 vps639187 sshd\[21559\]: Invalid user work from 167.114.98.229 port 34214
May 10 15:16:27 vps639187 sshd\[21559\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.98.229
May 10 15:16:29 vps639187 sshd\[21559\]: Failed password for invalid user work from 167.114.98.229 port 34214 ssh2
...
2020-05-10 21:31:13
188.166.232.29 attack
SSH invalid-user multiple login try
2020-05-10 21:26:54
182.61.133.172 attackbotsspam
(sshd) Failed SSH login from 182.61.133.172 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 10 14:50:19 amsweb01 sshd[19635]: User admin from 182.61.133.172 not allowed because not listed in AllowUsers
May 10 14:50:19 amsweb01 sshd[19635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.133.172  user=admin
May 10 14:50:21 amsweb01 sshd[19635]: Failed password for invalid user admin from 182.61.133.172 port 42790 ssh2
May 10 14:54:19 amsweb01 sshd[20108]: Invalid user cloud from 182.61.133.172 port 53992
May 10 14:54:21 amsweb01 sshd[20108]: Failed password for invalid user cloud from 182.61.133.172 port 53992 ssh2
2020-05-10 22:02:13
106.0.6.33 attackspambots
port scan and connect, tcp 1433 (ms-sql-s)
2020-05-10 21:50:43
36.80.186.83 attackspambots
Unauthorized connection attempt from IP address 36.80.186.83 on Port 445(SMB)
2020-05-10 21:53:59
103.232.120.109 attackspam
May 10 15:57:42 vps639187 sshd\[22319\]: Invalid user postgres from 103.232.120.109 port 53512
May 10 15:57:42 vps639187 sshd\[22319\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.232.120.109
May 10 15:57:44 vps639187 sshd\[22319\]: Failed password for invalid user postgres from 103.232.120.109 port 53512 ssh2
...
2020-05-10 22:01:28
27.100.13.140 attack
Unauthorized connection attempt from IP address 27.100.13.140 on Port 445(SMB)
2020-05-10 21:25:49
159.65.137.23 attack
2020-05-10T13:28:26.716137shield sshd\[30670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.137.23  user=root
2020-05-10T13:28:29.364168shield sshd\[30670\]: Failed password for root from 159.65.137.23 port 58264 ssh2
2020-05-10T13:30:33.867131shield sshd\[31950\]: Invalid user kristina from 159.65.137.23 port 58298
2020-05-10T13:30:33.869763shield sshd\[31950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.137.23
2020-05-10T13:30:35.283509shield sshd\[31950\]: Failed password for invalid user kristina from 159.65.137.23 port 58298 ssh2
2020-05-10 21:48:16
18.197.204.193 attackspambots
[Wed Apr 29 13:33:04 2020] - DDoS Attack From IP: 18.197.204.193 Port: 22
2020-05-10 21:55:35
103.36.102.244 attackspam
May 10 14:14:50 host sshd[10102]: Invalid user coeadrc from 103.36.102.244 port 47598
...
2020-05-10 21:39:35
190.1.203.180 attack
2020-05-10T12:57:43.016326shield sshd\[19239\]: Invalid user click from 190.1.203.180 port 56724
2020-05-10T12:57:43.020160shield sshd\[19239\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=dsl-emcali-190.1.203.180.emcali.net.co
2020-05-10T12:57:44.993868shield sshd\[19239\]: Failed password for invalid user click from 190.1.203.180 port 56724 ssh2
2020-05-10T13:01:31.928440shield sshd\[20276\]: Invalid user usuario from 190.1.203.180 port 34306
2020-05-10T13:01:31.932237shield sshd\[20276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=dsl-emcali-190.1.203.180.emcali.net.co
2020-05-10 21:33:20
148.72.212.161 attackspam
2020-05-10T15:16:07.853695sd-86998 sshd[4806]: Invalid user taiga from 148.72.212.161 port 41066
2020-05-10T15:16:07.859399sd-86998 sshd[4806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-148-72-212-161.ip.secureserver.net
2020-05-10T15:16:07.853695sd-86998 sshd[4806]: Invalid user taiga from 148.72.212.161 port 41066
2020-05-10T15:16:10.056290sd-86998 sshd[4806]: Failed password for invalid user taiga from 148.72.212.161 port 41066 ssh2
2020-05-10T15:19:26.336693sd-86998 sshd[5249]: Invalid user zelalem from 148.72.212.161 port 33222
...
2020-05-10 21:52:32
61.177.172.128 attackspam
May 10 15:40:35 * sshd[3866]: Failed password for root from 61.177.172.128 port 23841 ssh2
May 10 15:40:49 * sshd[3866]: error: maximum authentication attempts exceeded for root from 61.177.172.128 port 23841 ssh2 [preauth]
2020-05-10 21:41:44

Recently Reported IPs

130.96.39.154 36.240.120.134 169.147.66.170 119.248.96.170
248.167.23.240 49.19.238.202 255.213.8.88 242.207.133.22
15.255.157.139 218.174.40.120 31.173.12.181 56.192.212.122
94.224.152.105 218.139.82.50 190.223.20.27 235.18.51.33
164.68.72.86 211.69.114.249 123.58.199.48 150.49.226.166