Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom of Great Britain and Northern Ireland (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.166.131.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28486
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.166.131.70.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 15:46:54 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 70.131.166.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 70.131.166.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
117.121.100.228 attack
2019-11-08T07:06:27.444120shield sshd\[3304\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.121.100.228  user=root
2019-11-08T07:06:29.448910shield sshd\[3304\]: Failed password for root from 117.121.100.228 port 56406 ssh2
2019-11-08T07:10:58.459620shield sshd\[3899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.121.100.228  user=root
2019-11-08T07:11:00.334102shield sshd\[3899\]: Failed password for root from 117.121.100.228 port 33810 ssh2
2019-11-08T07:15:34.358013shield sshd\[4439\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.121.100.228  user=root
2019-11-08 15:25:48
49.81.95.53 attack
SpamReport
2019-11-08 15:32:59
167.172.139.65 attack
POST /wp-login.php HTTP/1.1 200 1827 Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0
2019-11-08 15:48:19
117.192.116.85 attackbots
Unauthorized connection attempt from IP address 117.192.116.85 on Port 445(SMB)
2019-11-08 15:55:08
176.109.234.114 attackspam
" "
2019-11-08 15:45:24
114.67.69.200 attack
Automatic report - Banned IP Access
2019-11-08 15:42:50
45.227.253.141 attackspambots
Nov  8 08:44:48 relay postfix/smtpd\[30471\]: warning: unknown\[45.227.253.141\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  8 08:44:50 relay postfix/smtpd\[28660\]: warning: unknown\[45.227.253.141\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  8 08:47:54 relay postfix/smtpd\[28044\]: warning: unknown\[45.227.253.141\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  8 08:48:02 relay postfix/smtpd\[30471\]: warning: unknown\[45.227.253.141\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  8 08:48:24 relay postfix/smtpd\[3522\]: warning: unknown\[45.227.253.141\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-08 15:50:59
103.48.180.117 attackbots
Nov  8 09:36:54 microserver sshd[6560]: Invalid user cn from 103.48.180.117 port 52673
Nov  8 09:36:54 microserver sshd[6560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.48.180.117
Nov  8 09:36:56 microserver sshd[6560]: Failed password for invalid user cn from 103.48.180.117 port 52673 ssh2
Nov  8 09:41:07 microserver sshd[7192]: Invalid user webservice from 103.48.180.117 port 31809
Nov  8 09:41:07 microserver sshd[7192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.48.180.117
Nov  8 09:53:35 microserver sshd[8638]: Invalid user 123 from 103.48.180.117 port 26082
Nov  8 09:53:35 microserver sshd[8638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.48.180.117
Nov  8 09:53:36 microserver sshd[8638]: Failed password for invalid user 123 from 103.48.180.117 port 26082 ssh2
Nov  8 09:57:56 microserver sshd[9245]: Invalid user amp from 103.48.180.117 port 62209
Nov  8 09:57
2019-11-08 15:43:59
222.88.238.242 attackbotsspam
Unauthorized connection attempt from IP address 222.88.238.242 on Port 139(NETBIOS)
2019-11-08 15:36:32
45.178.2.0 attackspambots
Malicious/Probing: /wp-login.php
2019-11-08 15:43:38
83.97.20.46 attackspam
83.97.20.46 was recorded 108 times by 30 hosts attempting to connect to the following ports: 523,13,6666,6667. Incident counter (4h, 24h, all-time): 108, 197, 197
2019-11-08 15:37:01
212.232.40.134 attackbots
Automatic report - Port Scan Attack
2019-11-08 15:52:12
180.76.196.179 attackspambots
Nov  8 07:25:19 fr01 sshd[11129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.196.179  user=root
Nov  8 07:25:20 fr01 sshd[11129]: Failed password for root from 180.76.196.179 port 46316 ssh2
Nov  8 07:29:37 fr01 sshd[11911]: Invalid user rails from 180.76.196.179
...
2019-11-08 15:52:26
117.22.68.46 attackspambots
Nov807:29:10server2pure-ftpd:\(\?@117.22.68.46\)[WARNING]Authenticationfailedforuser[ticinoscout]Nov807:29:17server2pure-ftpd:\(\?@117.22.68.46\)[WARNING]Authenticationfailedforuser[ticinoscout]Nov807:29:29server2pure-ftpd:\(\?@117.22.68.46\)[WARNING]Authenticationfailedforuser[www]Nov807:29:38server2pure-ftpd:\(\?@117.22.68.46\)[WARNING]Authenticationfailedforuser[www]Nov807:29:49server2pure-ftpd:\(\?@117.22.68.46\)[WARNING]Authenticationfailedforuser[www]Nov807:30:01server2pure-ftpd:\(\?@117.22.68.46\)[WARNING]Authenticationfailedforuser[www]Nov807:30:10server2pure-ftpd:\(\?@117.22.68.46\)[WARNING]Authenticationfailedforuser[www]Nov807:30:16server2pure-ftpd:\(\?@117.22.68.46\)[WARNING]Authenticationfailedforuser[www]
2019-11-08 15:26:22
178.128.242.161 attackspambots
POST /wp-login.php HTTP/1.1 200 1827 Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0
2019-11-08 15:44:57

Recently Reported IPs

172.143.148.188 70.113.187.90 21.145.90.129 190.170.226.68
115.144.90.180 180.88.255.155 93.64.130.82 234.220.158.155
148.173.37.158 53.24.205.19 83.210.0.235 159.40.0.185
241.111.187.206 126.97.51.28 216.42.106.240 76.230.26.58
3.227.247.87 33.88.65.14 75.148.194.146 133.153.36.172