Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Finland

Internet Service Provider: Elisa

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.97.31.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41408
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.97.31.142.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031201 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 13 10:01:27 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 142.31.97.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.31.97.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
97.76.135.58 attackbotsspam
Port Scan: UDP/137
2019-08-16 23:44:57
213.91.181.177 attack
Port Scan: TCP/445
2019-08-16 23:53:50
175.163.52.193 attack
Port Scan: TCP/5555
2019-08-16 23:38:09
51.158.113.194 attack
Aug 16 18:17:59 dedicated sshd[24937]: Invalid user Server2012 from 51.158.113.194 port 50122
2019-08-17 00:22:34
70.35.198.240 attackbotsspam
Port Scan: TCP/445
2019-08-16 23:47:22
47.176.29.34 attackspambots
Port Scan: UDP/137
2019-08-16 23:49:31
42.238.11.57 attackbotsspam
Port Scan: TCP/23
2019-08-16 23:51:09
181.115.25.31 attackspam
Port Scan: TCP/445
2019-08-16 23:37:04
185.220.102.6 attackspam
Caught in portsentry honeypot
2019-08-17 00:33:06
192.58.143.142 attackspam
Port Scan: TCP/23
2019-08-16 23:33:28
201.184.7.63 attack
Port Scan: TCP/445
2019-08-16 23:54:56
162.245.108.5 attackbots
Port Scan: UDP/137
2019-08-17 00:06:40
139.155.87.225 attackspambots
Splunk® : port scan detected:
Aug 16 10:24:29 testbed kernel: Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=82:c6:52:d1:6e:53:64:c3:d6:0b:ef:f0:08:00 SRC=139.155.87.225 DST=104.248.11.191 LEN=60 TOS=0x00 PREC=0x00 TTL=42 ID=60580 DF PROTO=TCP SPT=54474 DPT=9200 WINDOW=29200 RES=0x00 SYN URGP=0
2019-08-17 00:09:09
213.139.35.167 attack
Port Scan: TCP/23
2019-08-16 23:31:48
177.102.111.102 attackbotsspam
Port Scan: TCP/8080
2019-08-17 00:04:11

Recently Reported IPs

230.73.111.21 136.4.67.153 240.120.151.247 174.174.102.79
172.63.229.101 212.40.127.197 173.153.43.207 203.222.2.47
235.43.166.120 119.163.37.183 221.222.200.152 116.94.13.28
90.185.234.250 24.235.249.98 79.161.48.152 197.36.115.31
95.185.74.46 6.107.113.38 168.18.248.189 243.222.136.228