Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Sarpsborg

Region: Viken

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.98.2.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64233
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.98.2.16.			IN	A

;; AUTHORITY SECTION:
.			333	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031201 1800 900 604800 86400

;; Query time: 75 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 13 13:07:35 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 16.2.98.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 16.2.98.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.77.158.118 attackspambots
Hacking
2020-02-05 14:29:54
46.0.203.166 attack
$f2bV_matches
2020-02-05 14:39:05
14.185.122.11 attackspambots
Unauthorized connection attempt detected from IP address 14.185.122.11 to port 445
2020-02-05 14:37:54
151.3.36.69 attack
Automatic report - Port Scan Attack
2020-02-05 14:58:10
36.155.112.131 attack
Feb  5 07:02:15 sd-53420 sshd\[21883\]: Invalid user bulletins from 36.155.112.131
Feb  5 07:02:15 sd-53420 sshd\[21883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.112.131
Feb  5 07:02:17 sd-53420 sshd\[21883\]: Failed password for invalid user bulletins from 36.155.112.131 port 50301 ssh2
Feb  5 07:05:56 sd-53420 sshd\[22241\]: User root from 36.155.112.131 not allowed because none of user's groups are listed in AllowGroups
Feb  5 07:05:56 sd-53420 sshd\[22241\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.112.131  user=root
...
2020-02-05 14:52:28
103.248.83.249 attackspam
Feb  5 05:50:10 silence02 sshd[28601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.248.83.249
Feb  5 05:50:13 silence02 sshd[28601]: Failed password for invalid user hayden from 103.248.83.249 port 38262 ssh2
Feb  5 05:53:36 silence02 sshd[28836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.248.83.249
2020-02-05 14:32:15
178.33.45.156 attackspam
Feb  5 02:54:15 firewall sshd[29805]: Invalid user yan from 178.33.45.156
Feb  5 02:54:17 firewall sshd[29805]: Failed password for invalid user yan from 178.33.45.156 port 40194 ssh2
Feb  5 02:58:13 firewall sshd[29952]: Invalid user charlene from 178.33.45.156
...
2020-02-05 14:20:31
115.75.6.182 attackbots
2020-02-05T04:52:56.379Z CLOSE host=115.75.6.182 port=51434 fd=4 time=950.630 bytes=1764
...
2020-02-05 14:55:13
118.174.209.147 attackspambots
Fail2Ban Ban Triggered
2020-02-05 14:21:39
129.213.145.118 attackspambots
Feb  5 07:04:29 legacy sshd[21645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.145.118
Feb  5 07:04:31 legacy sshd[21645]: Failed password for invalid user 9@177cz from 129.213.145.118 port 34338 ssh2
Feb  5 07:07:19 legacy sshd[21805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.145.118
...
2020-02-05 14:59:39
115.74.58.52 attackspam
20/2/4@23:53:42: FAIL: Alarm-Network address from=115.74.58.52
20/2/4@23:53:43: FAIL: Alarm-Network address from=115.74.58.52
...
2020-02-05 14:26:19
72.176.195.115 attack
Automatic report - Banned IP Access
2020-02-05 14:54:25
5.249.146.176 attackbotsspam
Feb  4 20:18:03 hpm sshd\[27221\]: Invalid user alfaro from 5.249.146.176
Feb  4 20:18:03 hpm sshd\[27221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.249.146.176
Feb  4 20:18:05 hpm sshd\[27221\]: Failed password for invalid user alfaro from 5.249.146.176 port 44226 ssh2
Feb  4 20:21:34 hpm sshd\[27631\]: Invalid user 1qazXSW@ from 5.249.146.176
Feb  4 20:21:34 hpm sshd\[27631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.249.146.176
2020-02-05 14:31:47
122.51.23.135 attackbotsspam
Unauthorized connection attempt detected from IP address 122.51.23.135 to port 2220 [J]
2020-02-05 14:41:25
43.229.89.113 attackbotsspam
DATE:2020-02-05 05:52:21, IP:43.229.89.113, PORT:1433 MSSQL brute force auth on honeypot server (epe-honey1-hq)
2020-02-05 14:43:28

Recently Reported IPs

98.137.156.250 200.181.125.195 195.133.40.22 207.191.249.228
250.168.152.88 104.230.230.50 225.210.233.89 204.8.218.164
226.147.13.87 12.154.192.205 90.35.45.171 240.201.6.123
100.88.165.226 119.212.1.92 198.50.252.31 16.123.133.31
217.165.56.28 253.48.181.164 26.71.154.137 212.191.102.66