Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.126.2.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7409
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;166.126.2.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 14:18:05 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 139.2.126.166.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.2.126.166.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
74.132.135.242 attackspambots
Chat Spam
2019-09-07 18:19:42
85.55.252.10 attackspam
Sep  7 11:10:54 MK-Soft-VM7 sshd\[3702\]: Invalid user ts2 from 85.55.252.10 port 58992
Sep  7 11:10:54 MK-Soft-VM7 sshd\[3702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.55.252.10
Sep  7 11:10:56 MK-Soft-VM7 sshd\[3702\]: Failed password for invalid user ts2 from 85.55.252.10 port 58992 ssh2
...
2019-09-07 19:12:30
185.140.29.94 attackbotsspam
Sep  7 12:25:58 dedicated sshd[14660]: Invalid user ubuntu from 185.140.29.94 port 55354
2019-09-07 18:40:57
176.192.125.74 attack
Unauthorized connection attempt from IP address 176.192.125.74 on Port 445(SMB)
2019-09-07 18:32:52
80.211.82.228 attack
Sep  6 23:49:07 hanapaa sshd\[9168\]: Invalid user pass from 80.211.82.228
Sep  6 23:49:07 hanapaa sshd\[9168\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.82.228
Sep  6 23:49:09 hanapaa sshd\[9168\]: Failed password for invalid user pass from 80.211.82.228 port 54066 ssh2
Sep  6 23:53:09 hanapaa sshd\[9494\]: Invalid user 12345678 from 80.211.82.228
Sep  6 23:53:09 hanapaa sshd\[9494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.82.228
2019-09-07 18:36:30
112.85.42.89 attackbots
Sep  7 12:59:09 ubuntu-2gb-nbg1-dc3-1 sshd[24482]: Failed password for root from 112.85.42.89 port 30439 ssh2
Sep  7 12:59:14 ubuntu-2gb-nbg1-dc3-1 sshd[24482]: error: maximum authentication attempts exceeded for root from 112.85.42.89 port 30439 ssh2 [preauth]
...
2019-09-07 19:11:05
59.63.206.47 attackspambots
Sep  7 13:03:55 eventyay sshd[31724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.63.206.47
Sep  7 13:03:56 eventyay sshd[31724]: Failed password for invalid user admin from 59.63.206.47 port 25184 ssh2
Sep  7 13:09:20 eventyay sshd[31843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.63.206.47
...
2019-09-07 19:13:33
41.76.169.43 attack
$f2bV_matches
2019-09-07 18:28:00
167.71.234.210 attackspambots
07.09.2019 02:32:44 - Wordpress fail 
Detected by ELinOX-ALM
2019-09-07 18:18:41
187.12.167.85 attackspambots
$f2bV_matches
2019-09-07 18:13:04
91.121.157.15 attack
Sep  7 01:04:16 web9 sshd\[3431\]: Invalid user tomcat from 91.121.157.15
Sep  7 01:04:16 web9 sshd\[3431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.157.15
Sep  7 01:04:18 web9 sshd\[3431\]: Failed password for invalid user tomcat from 91.121.157.15 port 51494 ssh2
Sep  7 01:08:30 web9 sshd\[4315\]: Invalid user support from 91.121.157.15
Sep  7 01:08:30 web9 sshd\[4315\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.157.15
2019-09-07 19:12:08
195.154.242.13 attack
Sep  7 09:02:28 MK-Soft-VM6 sshd\[18416\]: Invalid user 12345 from 195.154.242.13 port 40573
Sep  7 09:02:28 MK-Soft-VM6 sshd\[18416\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.154.242.13
Sep  7 09:02:29 MK-Soft-VM6 sshd\[18416\]: Failed password for invalid user 12345 from 195.154.242.13 port 40573 ssh2
...
2019-09-07 18:18:05
23.102.170.180 attackspam
Sep  6 19:27:57 dallas01 sshd[17313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.102.170.180
Sep  6 19:27:59 dallas01 sshd[17313]: Failed password for invalid user test from 23.102.170.180 port 50280 ssh2
Sep  6 19:32:06 dallas01 sshd[18646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.102.170.180
2019-09-07 18:43:34
73.161.112.2 attack
Sep  7 00:48:25 hiderm sshd\[8861\]: Invalid user test from 73.161.112.2
Sep  7 00:48:26 hiderm sshd\[8861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-73-161-112-2.hsd1.mi.comcast.net
Sep  7 00:48:27 hiderm sshd\[8861\]: Failed password for invalid user test from 73.161.112.2 port 50896 ssh2
Sep  7 00:52:46 hiderm sshd\[9231\]: Invalid user odoo from 73.161.112.2
Sep  7 00:52:46 hiderm sshd\[9231\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-73-161-112-2.hsd1.mi.comcast.net
2019-09-07 18:55:27
165.22.96.131 attackspam
Sep  7 11:38:15 DAAP sshd[15195]: Invalid user tmpuser from 165.22.96.131 port 38696
...
2019-09-07 18:45:28

Recently Reported IPs

82.8.39.180 236.122.160.240 184.186.76.90 88.207.14.37
34.18.179.208 71.227.162.238 141.65.116.68 238.49.127.130
219.169.34.41 217.165.27.235 70.212.41.210 48.138.58.83
160.169.202.96 248.211.72.126 236.68.47.38 133.178.173.104
74.4.223.205 40.62.146.63 114.106.210.254 56.227.73.138