Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.98.12.31
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62888
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.98.12.31.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 17:48:28 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 31.12.98.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 31.12.98.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
180.76.176.174 attackbotsspam
Jun  2 23:45:43 mx sshd[24818]: Failed password for root from 180.76.176.174 port 38220 ssh2
2020-06-03 17:28:09
120.53.12.94 attackspam
2020-06-03T04:16:38.894031shield sshd\[9721\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.53.12.94  user=root
2020-06-03T04:16:41.221593shield sshd\[9721\]: Failed password for root from 120.53.12.94 port 57894 ssh2
2020-06-03T04:18:44.175248shield sshd\[10202\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.53.12.94  user=root
2020-06-03T04:18:46.131739shield sshd\[10202\]: Failed password for root from 120.53.12.94 port 53508 ssh2
2020-06-03T04:20:51.892113shield sshd\[10645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.53.12.94  user=root
2020-06-03 17:49:52
210.245.108.193 attackbotsspam
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-06-03 17:23:05
89.187.178.158 attack
(From crawford.stella@yahoo.com) Would you like to post your business on 1000's of Advertising sites every month? One tiny investment every month will get you virtually endless traffic to your site forever!

For details check out: https://bit.ly/adpostingfast
2020-06-03 17:36:46
154.8.175.241 attack
2020-06-03T11:02:32.618415vps773228.ovh.net sshd[31245]: Failed password for root from 154.8.175.241 port 57460 ssh2
2020-06-03T11:04:46.055569vps773228.ovh.net sshd[31255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.175.241  user=root
2020-06-03T11:04:47.723919vps773228.ovh.net sshd[31255]: Failed password for root from 154.8.175.241 port 33100 ssh2
2020-06-03T11:07:02.507213vps773228.ovh.net sshd[31300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.175.241  user=root
2020-06-03T11:07:04.847737vps773228.ovh.net sshd[31300]: Failed password for root from 154.8.175.241 port 36978 ssh2
...
2020-06-03 17:29:37
142.93.104.32 attack
Jun  3 08:31:15 abendstille sshd\[32095\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.104.32  user=root
Jun  3 08:31:17 abendstille sshd\[32095\]: Failed password for root from 142.93.104.32 port 50084 ssh2
Jun  3 08:34:19 abendstille sshd\[2621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.104.32  user=root
Jun  3 08:34:21 abendstille sshd\[2621\]: Failed password for root from 142.93.104.32 port 49174 ssh2
Jun  3 08:40:30 abendstille sshd\[8628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.104.32  user=root
...
2020-06-03 17:15:48
185.216.32.130 attackbotsspam
Jun  3 09:34:58 host sshd[6854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.216.32.130  user=root
Jun  3 09:35:00 host sshd[6854]: Failed password for root from 185.216.32.130 port 37511 ssh2
...
2020-06-03 17:54:54
138.197.12.187 attackspam
SIP/5060 Probe, BF, Hack -
2020-06-03 17:22:33
117.131.60.59 attack
2020-06-03T02:07:02.847180linuxbox-skyline sshd[104897]: Invalid user alpha1\r from 117.131.60.59 port 33048
...
2020-06-03 17:44:07
139.59.169.84 attackspambots
Automatic report - XMLRPC Attack
2020-06-03 17:35:07
61.177.172.128 attackspambots
Unauthorized connection attempt detected from IP address 61.177.172.128 to port 22
2020-06-03 17:29:04
223.194.33.72 attack
2020-06-03T02:34:39.612237linuxbox-skyline sshd[105285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.194.33.72  user=root
2020-06-03T02:34:41.880260linuxbox-skyline sshd[105285]: Failed password for root from 223.194.33.72 port 35914 ssh2
...
2020-06-03 17:27:46
218.92.0.189 attackspambots
Fail2Ban Ban Triggered
2020-06-03 17:19:18
165.227.210.71 attackbotsspam
2020-06-03T08:17:21.139789abusebot-7.cloudsearch.cf sshd[7315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.210.71  user=root
2020-06-03T08:17:23.571284abusebot-7.cloudsearch.cf sshd[7315]: Failed password for root from 165.227.210.71 port 56478 ssh2
2020-06-03T08:20:38.835924abusebot-7.cloudsearch.cf sshd[7485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.210.71  user=root
2020-06-03T08:20:40.647388abusebot-7.cloudsearch.cf sshd[7485]: Failed password for root from 165.227.210.71 port 60284 ssh2
2020-06-03T08:23:54.132811abusebot-7.cloudsearch.cf sshd[7659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.210.71  user=root
2020-06-03T08:23:56.187373abusebot-7.cloudsearch.cf sshd[7659]: Failed password for root from 165.227.210.71 port 35852 ssh2
2020-06-03T08:27:05.299344abusebot-7.cloudsearch.cf sshd[7919]: pam_unix(sshd:auth): authen
...
2020-06-03 17:37:28
103.133.109.249 attackspam
SIP/5060 Probe, BF, Hack -
2020-06-03 17:23:41

Recently Reported IPs

85.243.228.89 82.106.124.12 202.116.57.147 56.141.1.77
9.207.52.237 212.62.247.178 101.162.164.142 134.128.243.246
93.209.34.197 216.19.48.33 181.49.175.150 55.93.248.76
148.89.134.223 4.131.182.16 130.11.191.207 164.117.101.95
13.190.106.36 141.24.74.71 120.138.84.159 19.112.198.8