Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.2.167.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45311
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.2.167.16.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013001 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 10:12:50 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 16.167.2.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 16.167.2.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.13.141.202 attack
Automatic report - SSH Brute-Force Attack
2020-01-04 06:57:46
190.9.130.159 attack
2020-01-04T08:22:24.906749luisaranguren sshd[971083]: Connection from 190.9.130.159 port 52373 on 10.10.10.6 port 22 rdomain ""
2020-01-04T08:22:26.554797luisaranguren sshd[971083]: Invalid user louise from 190.9.130.159 port 52373
2020-01-04T08:22:26.562071luisaranguren sshd[971083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.9.130.159
2020-01-04T08:22:24.906749luisaranguren sshd[971083]: Connection from 190.9.130.159 port 52373 on 10.10.10.6 port 22 rdomain ""
2020-01-04T08:22:26.554797luisaranguren sshd[971083]: Invalid user louise from 190.9.130.159 port 52373
2020-01-04T08:22:28.981367luisaranguren sshd[971083]: Failed password for invalid user louise from 190.9.130.159 port 52373 ssh2
...
2020-01-04 07:03:22
23.94.94.71 attack
Jan  3 21:31:42 unicornsoft sshd\[4609\]: Invalid user sitekeur from 23.94.94.71
Jan  3 21:31:42 unicornsoft sshd\[4609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.94.94.71
Jan  3 21:31:44 unicornsoft sshd\[4609\]: Failed password for invalid user sitekeur from 23.94.94.71 port 38096 ssh2
2020-01-04 07:06:49
211.159.173.3 attack
SSH brutforce
2020-01-04 06:54:05
31.222.195.30 attack
2020-01-04T00:21:10.184922scmdmz1 sshd[30989]: Invalid user sqw from 31.222.195.30 port 8490
2020-01-04T00:21:10.187484scmdmz1 sshd[30989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.222.195.30
2020-01-04T00:21:10.184922scmdmz1 sshd[30989]: Invalid user sqw from 31.222.195.30 port 8490
2020-01-04T00:21:12.274462scmdmz1 sshd[30989]: Failed password for invalid user sqw from 31.222.195.30 port 8490 ssh2
2020-01-04T00:22:32.524467scmdmz1 sshd[31093]: Invalid user demo from 31.222.195.30 port 50327
...
2020-01-04 07:32:56
124.205.67.186 attack
Jan  3 22:05:37 ns4 sshd[16320]: Invalid user zabbix from 124.205.67.186
Jan  3 22:05:37 ns4 sshd[16320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.205.67.186 
Jan  3 22:05:40 ns4 sshd[16320]: Failed password for invalid user zabbix from 124.205.67.186 port 56254 ssh2
Jan  3 22:06:51 ns4 sshd[16567]: Invalid user zimeip from 124.205.67.186
Jan  3 22:06:51 ns4 sshd[16567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.205.67.186 
Jan  3 22:06:53 ns4 sshd[16567]: Failed password for invalid user zimeip from 124.205.67.186 port 38032 ssh2
Jan  3 22:08:09 ns4 sshd[16823]: Invalid user butter from 124.205.67.186
Jan  3 22:08:09 ns4 sshd[16823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.205.67.186 
Jan  3 22:08:10 ns4 sshd[16823]: Failed password for invalid user butter from 124.205.67.186 port 48050 ssh2


........
-----------------------------------------------
https://
2020-01-04 07:26:06
80.82.70.239 attackspam
01/03/2020-18:07:32.837432 80.82.70.239 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 82
2020-01-04 07:27:58
180.76.119.77 attackspambots
Jan  4 00:12:58 localhost sshd\[4598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.119.77  user=root
Jan  4 00:13:00 localhost sshd\[4598\]: Failed password for root from 180.76.119.77 port 58266 ssh2
Jan  4 00:16:03 localhost sshd\[5146\]: Invalid user bip from 180.76.119.77 port 50898
Jan  4 00:16:03 localhost sshd\[5146\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.119.77
2020-01-04 07:30:30
196.1.208.226 attackspambots
Jan  3 22:17:12 eventyay sshd[30775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.1.208.226
Jan  3 22:17:14 eventyay sshd[30775]: Failed password for invalid user qwa from 196.1.208.226 port 49676 ssh2
Jan  3 22:22:02 eventyay sshd[30840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.1.208.226
...
2020-01-04 07:24:19
159.203.201.1 attackbots
SSH login attempts with user root at 2019-12-27.
2020-01-04 06:58:33
209.45.48.138 attack
1578086558 - 01/03/2020 22:22:38 Host: 209.45.48.138/209.45.48.138 Port: 445 TCP Blocked
2020-01-04 06:59:21
197.47.198.126 attack
Trying ports that it shouldn't be.
2020-01-04 07:21:33
185.209.0.32 attackspambots
01/03/2020-17:37:11.152189 185.209.0.32 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-01-04 07:25:24
64.210.151.32 attackbotsspam
Ukraine porn phishing link promos.fling.com
2020-01-04 07:06:21
222.186.173.142 attackspam
Jan  3 23:48:10 localhost sshd\[1458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142  user=root
Jan  3 23:48:12 localhost sshd\[1458\]: Failed password for root from 222.186.173.142 port 1886 ssh2
Jan  3 23:48:15 localhost sshd\[1458\]: Failed password for root from 222.186.173.142 port 1886 ssh2
2020-01-04 07:00:20

Recently Reported IPs

114.83.129.147 84.69.30.5 238.139.164.192 35.163.237.233
217.42.161.251 99.124.181.141 140.250.141.3 22.192.254.55
53.123.40.20 74.42.194.208 19.172.99.88 108.12.212.4
220.104.52.174 124.97.175.118 92.197.91.32 215.10.250.173
87.125.21.14 197.14.31.74 217.222.126.194 90.202.8.11