Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom of Great Britain and Northern Ireland (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.166.5.192
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22974
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.166.5.192.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 10:26:35 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 192.5.166.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 192.5.166.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
78.187.144.160 attackspam
Unauthorized connection attempt detected from IP address 78.187.144.160 to port 445
2019-12-24 16:57:54
178.64.174.146 attackbots
Unauthorized connection attempt detected from IP address 178.64.174.146 to port 445
2019-12-24 16:57:08
165.227.144.125 attackspam
Dec 24 09:10:36 ns3110291 sshd\[17508\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.144.125  user=root
Dec 24 09:10:38 ns3110291 sshd\[17508\]: Failed password for root from 165.227.144.125 port 37078 ssh2
Dec 24 09:12:33 ns3110291 sshd\[17560\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.144.125  user=root
Dec 24 09:12:35 ns3110291 sshd\[17560\]: Failed password for root from 165.227.144.125 port 56312 ssh2
Dec 24 09:14:29 ns3110291 sshd\[17609\]: Invalid user server from 165.227.144.125
...
2019-12-24 16:35:14
40.107.6.102 attackspam
Spam/Phish - smtp.mailfrom=salmrr.onmicrosoft.com; dmarc=none action=none
smtp.mailfrom=salmrr.onmicrosoft.com; live.com; dkim=pass (signature wasReceived: from CO1NAM04HT003.eop-NAM04.prod.protection.outlook.com Received: from CO1NAM04FT027.eop-NAM04.prod.protection.outlook.com
2019-12-24 16:51:30
116.20.231.207 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-12-24 16:35:49
222.186.175.183 attack
Dec 24 03:30:58 linuxvps sshd\[25200\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.183  user=root
Dec 24 03:31:00 linuxvps sshd\[25200\]: Failed password for root from 222.186.175.183 port 4434 ssh2
Dec 24 03:31:13 linuxvps sshd\[25200\]: Failed password for root from 222.186.175.183 port 4434 ssh2
Dec 24 03:31:16 linuxvps sshd\[25376\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.183  user=root
Dec 24 03:31:19 linuxvps sshd\[25376\]: Failed password for root from 222.186.175.183 port 21952 ssh2
2019-12-24 16:31:51
92.118.38.39 attack
Dec 24 09:34:43 webserver postfix/smtpd\[5149\]: warning: unknown\[92.118.38.39\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 24 09:35:15 webserver postfix/smtpd\[3126\]: warning: unknown\[92.118.38.39\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 24 09:35:47 webserver postfix/smtpd\[5149\]: warning: unknown\[92.118.38.39\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 24 09:36:19 webserver postfix/smtpd\[4480\]: warning: unknown\[92.118.38.39\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 24 09:36:51 webserver postfix/smtpd\[3126\]: warning: unknown\[92.118.38.39\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-12-24 16:36:24
219.77.160.158 attackspam
" "
2019-12-24 16:34:46
181.112.190.222 attack
Hits on port : 5500
2019-12-24 17:08:57
46.237.99.147 attackbots
Automatic report - Port Scan Attack
2019-12-24 16:53:43
196.61.38.138 attack
Hits on port : 445
2019-12-24 17:07:08
196.188.114.117 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2019-12-24 17:08:02
46.29.255.107 attackbots
2019-12-24 01:19:08 H=(fnNnla3l) [46.29.255.107]:56985 I=[192.147.25.65]:25 F= rejected RCPT : Sender verify failed
2019-12-24 01:19:21 dovecot_login authenticator failed for (Sqpfc7Mh) [46.29.255.107]:59495 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=ashly@lerctr.org)
2019-12-24 01:19:38 dovecot_login authenticator failed for (0zm1G97) [46.29.255.107]:61980 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=ashly@lerctr.org)
...
2019-12-24 16:38:23
222.186.169.192 attack
$f2bV_matches
2019-12-24 17:10:28
92.63.196.10 attack
Fail2Ban Ban Triggered
2019-12-24 16:45:06

Recently Reported IPs

166.20.244.91 58.188.119.190 143.44.204.31 88.63.87.234
237.103.241.156 75.182.234.248 17.172.220.158 150.147.222.28
55.79.57.41 182.200.77.32 129.11.170.215 95.194.193.186
43.106.121.218 153.194.84.140 230.147.224.64 212.35.35.210
104.46.245.54 54.112.163.70 191.226.215.168 168.79.37.239