Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.45.228.102
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13012
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.45.228.102.			IN	A

;; AUTHORITY SECTION:
.			122	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:04:11 CST 2022
;; MSG SIZE  rcvd: 107
Host info
102.228.45.139.in-addr.arpa is an alias for 102.96_27.228.45.139.in-addr.arpa.
102.96_27.228.45.139.in-addr.arpa domain name pointer serv12.mt.viaprog.eu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
102.228.45.139.in-addr.arpa	canonical name = 102.96_27.228.45.139.in-addr.arpa.
102.96_27.228.45.139.in-addr.arpa	name = serv12.mt.viaprog.eu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.49.249.42 attack
Nov 27 15:10:07 sd-53420 sshd\[6551\]: Invalid user king from 103.49.249.42
Nov 27 15:10:07 sd-53420 sshd\[6551\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.49.249.42
Nov 27 15:10:09 sd-53420 sshd\[6551\]: Failed password for invalid user king from 103.49.249.42 port 59570 ssh2
Nov 27 15:10:11 sd-53420 sshd\[6551\]: Failed password for invalid user king from 103.49.249.42 port 59570 ssh2
Nov 27 15:10:14 sd-53420 sshd\[6551\]: Failed password for invalid user king from 103.49.249.42 port 59570 ssh2
...
2019-11-27 22:17:59
139.59.7.76 attack
Nov 27 08:34:47 localhost sshd\[32699\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.7.76  user=root
Nov 27 08:34:48 localhost sshd\[32699\]: Failed password for root from 139.59.7.76 port 58694 ssh2
Nov 27 08:41:56 localhost sshd\[32972\]: Invalid user openerp from 139.59.7.76 port 37832
Nov 27 08:41:56 localhost sshd\[32972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.7.76
Nov 27 08:41:58 localhost sshd\[32972\]: Failed password for invalid user openerp from 139.59.7.76 port 37832 ssh2
...
2019-11-27 22:29:40
209.17.96.90 attackbotsspam
209.17.96.90 was recorded 5 times by 5 hosts attempting to connect to the following ports: 5060,6443,8531,10443,5632. Incident counter (4h, 24h, all-time): 5, 45, 865
2019-11-27 22:20:29
89.249.255.152 attackbotsspam
proto=tcp  .  spt=60481  .  dpt=25  .     (Found on   Dark List de Nov 27)     (526)
2019-11-27 22:45:16
31.209.110.52 attackbotsspam
Absender hat Spam-Falle ausgel?st
2019-11-27 22:50:16
103.8.195.34 attackspambots
Absender hat Spam-Falle ausgel?st
2019-11-27 22:43:45
95.77.103.171 attackbotsspam
95.76.0.0/15 blocked
2019-11-27 22:44:09
157.25.23.231 attackspam
proto=tcp  .  spt=34131  .  dpt=25  .     (Found on   Dark List de Nov 27)     (522)
2019-11-27 22:37:58
185.176.27.42 attack
11/27/2019-14:24:34.253257 185.176.27.42 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-27 22:12:11
85.172.107.1 attackspambots
Absender hat Spam-Falle ausgel?st
2019-11-27 22:45:31
168.121.139.199 attack
Absender hat Spam-Falle ausgel?st
2019-11-27 22:37:32
103.109.58.157 attackspam
Absender hat Spam-Falle ausgel?st
2019-11-27 22:41:48
81.177.73.7 attack
Absender hat Spam-Falle ausgel?st
2019-11-27 22:46:02
177.190.68.121 attackbotsspam
Absender hat Spam-Falle ausgel?st
2019-11-27 22:34:28
115.88.60.251 attackbotsspam
Absender hat Spam-Falle ausgel?st
2019-11-27 22:40:41

Recently Reported IPs

139.45.228.100 139.45.228.101 97.112.164.117 139.47.158.223
139.45.228.104 139.47.103.1 139.47.32.151 139.47.33.160
139.5.146.16 139.47.82.72 139.47.40.141 139.5.144.14
139.5.159.123 139.5.146.213 139.5.199.99 139.5.146.223
139.5.159.92 139.5.202.18 139.5.202.106 139.5.159.13