Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.182.139.190
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16593
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;198.182.139.190.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 19:32:51 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 190.139.182.198.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 190.139.182.198.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
188.168.82.51 attackbotsspam
1582532714 - 02/24/2020 09:25:14 Host: 188.168.82.51/188.168.82.51 Port: 445 TCP Blocked
2020-02-24 19:23:45
51.83.69.132 attackspam
51.83.69.132 - - [24/Feb/2020:13:55:15 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2"
...
2020-02-24 19:18:05
14.161.28.187 attack
Unauthorized connection attempt from IP address 14.161.28.187 on Port 445(SMB)
2020-02-24 19:38:33
192.241.219.87 attackspam
404 NOT FOUND
2020-02-24 19:49:49
1.68.247.243 attack
Port probing on unauthorized port 23
2020-02-24 19:36:35
36.231.52.61 attackspambots
Unauthorized connection attempt from IP address 36.231.52.61 on Port 445(SMB)
2020-02-24 19:23:28
125.162.179.158 attack
Unauthorized connection attempt from IP address 125.162.179.158 on Port 445(SMB)
2020-02-24 19:12:38
117.6.11.253 attackspambots
Unauthorized connection attempt from IP address 117.6.11.253 on Port 445(SMB)
2020-02-24 19:12:08
27.72.59.211 attack
Unauthorized connection attempt from IP address 27.72.59.211 on Port 445(SMB)
2020-02-24 19:14:18
180.251.192.97 attack
Unauthorized connection attempt from IP address 180.251.192.97 on Port 445(SMB)
2020-02-24 19:25:14
5.79.109.48 attack
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.79.109.48 
Failed password for invalid user weblogic from 5.79.109.48 port 45120 ssh2
Failed password for invalid user weblogic from 5.79.109.48 port 45120 ssh2
Failed password for invalid user weblogic from 5.79.109.48 port 45120 ssh2
2020-02-24 19:11:40
154.221.27.149 attack
suspicious action Mon, 24 Feb 2020 01:45:24 -0300
2020-02-24 19:39:34
5.35.157.229 attackspambots
Unauthorized connection attempt from IP address 5.35.157.229 on Port 445(SMB)
2020-02-24 19:15:56
219.85.187.180 attackspambots
suspicious action Mon, 24 Feb 2020 01:45:39 -0300
2020-02-24 19:29:27
114.33.121.154 attackspam
firewall-block, port(s): 26/tcp
2020-02-24 19:48:27

Recently Reported IPs

215.168.147.209 60.130.48.166 88.173.1.230 55.60.29.95
150.127.211.249 43.134.50.177 164.142.22.91 72.247.171.206
190.101.64.75 198.46.217.28 189.45.119.180 117.75.38.87
249.226.77.225 174.20.114.120 138.226.42.27 218.25.14.49
252.172.178.136 222.96.79.129 223.25.228.246 160.238.180.10