Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom of Great Britain and Northern Ireland (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.222.92.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34138
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.222.92.159.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 19:50:02 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 159.92.222.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 159.92.222.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
61.184.247.3 attackbotsspam
fire
2019-11-18 07:36:10
104.244.72.98 attackbots
leo_www
2019-11-18 07:45:54
103.214.157.69 attackbotsspam
Unauthorized access or intrusion attempt detected from Thor banned IP
2019-11-18 08:08:50
128.90.21.73 attackspam
128.90.21.73 was recorded 5 times by 2 hosts attempting to connect to the following ports: 50050. Incident counter (4h, 24h, all-time): 5, 5, 5
2019-11-18 08:06:02
193.188.22.156 attackspam
Connection by 193.188.22.156 on port: 3407 got caught by honeypot at 11/17/2019 9:43:37 PM
2019-11-18 07:39:46
145.249.105.204 attackspam
Invalid user test from 145.249.105.204 port 36780
2019-11-18 08:03:17
51.75.248.127 attackspambots
Nov 18 00:53:49 legacy sshd[31248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.248.127
Nov 18 00:53:51 legacy sshd[31248]: Failed password for invalid user achilles from 51.75.248.127 port 53146 ssh2
Nov 18 00:57:44 legacy sshd[31319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.248.127
...
2019-11-18 08:04:32
78.47.182.7 attack
78.47.182.7 - - [17/Nov/2019:23:42:46 +0100] "GET /awstats.pl?config=oraux.pnzone.net&lang=nl&output=lastrobots&update=1 HTTP/1.1" 404 280 "-" "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.6) Gecko/20070725 Firefox/2.0.0.6"
2019-11-18 07:53:11
209.251.20.139 attackspam
(From projobnetwork2@outlook.com) I came across your website (https://www.oatkachiropractic.com/page/contact.html) and just wanted to reach
out to see if you're hiring? 

If so, I'd like to extend an offer to post to top job sites like
ZipRecruiter, Glassdoor, TopUSAJobs, and more at no cost
for two weeks. 

Here are some of the key benefits: 

-- Post to top job sites with one click 
-- Manage all candidates in one place 
-- No cost for two weeks 

You can post your job openings now by going to our website below: 

>> TryProJob [dot] com 

* Please use offer code 987FREE -- Expires Soon * 

Thanks for your time, 
Ryan C. 

Pro Job Network 
10451 Twin Rivers Rd #279 
Columbia, MD 21044 

To OPT OUT, please email ryanc [at] pjnmail [dot] com
with "REMOVE oatkachiropractic.com" in the subject line.
2019-11-18 07:33:29
222.107.73.130 attackbotsspam
3389BruteforceFW22
2019-11-18 07:54:51
180.183.54.148 attackspambots
Nov 17 20:45:14 firewall sshd[4655]: Invalid user abc12345 from 180.183.54.148
Nov 17 20:45:16 firewall sshd[4655]: Failed password for invalid user abc12345 from 180.183.54.148 port 33062 ssh2
Nov 17 20:49:39 firewall sshd[4707]: Invalid user burstad from 180.183.54.148
...
2019-11-18 07:58:13
104.248.42.94 attack
Nov 17 23:21:47 icinga sshd[4842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.42.94 
Nov 17 23:21:49 icinga sshd[4842]: Failed password for invalid user xbmc from 104.248.42.94 port 49854 ssh2
Nov 17 23:42:58 icinga sshd[24675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.42.94 
...
2019-11-18 07:49:25
42.177.161.195 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/42.177.161.195/ 
 
 CN - 1H : (808)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4837 
 
 IP : 42.177.161.195 
 
 CIDR : 42.176.0.0/13 
 
 PREFIX COUNT : 1262 
 
 UNIQUE IP COUNT : 56665856 
 
 
 ATTACKS DETECTED ASN4837 :  
  1H - 12 
  3H - 30 
  6H - 73 
 12H - 142 
 24H - 285 
 
 DateTime : 2019-11-17 23:42:26 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-18 07:59:12
117.2.100.124 attackbotsspam
Automatic report - Banned IP Access
2019-11-18 07:54:12
110.219.106.149 attack
Bad bot/spoofed identity
2019-11-18 08:05:35

Recently Reported IPs

42.184.110.157 41.50.147.177 65.243.85.74 147.140.214.153
236.253.235.106 74.74.45.72 180.160.75.254 56.75.98.1
114.190.70.77 225.180.109.50 221.174.77.24 144.32.73.235
53.200.108.9 227.96.125.28 216.213.44.13 21.25.116.249
144.241.187.110 144.116.166.92 148.190.180.128 7.71.112.229