Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Stockholm

Region: Stockholm

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: Com Hem AB

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.100.193.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43224
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;213.100.193.139.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060400 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 05 01:00:52 CST 2019
;; MSG SIZE  rcvd: 119

Host info
139.193.100.213.in-addr.arpa domain name pointer c213.100.193-139.bredband.comhem.se.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
139.193.100.213.in-addr.arpa	name = c213.100.193-139.bredband.comhem.se.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
162.243.142.92 attack
Brute force attack stopped by firewall
2019-07-05 09:22:45
202.53.165.218 attackspam
Sending SPAM email
2019-07-05 09:45:23
51.15.191.178 attackbotsspam
Brute force attack stopped by firewall
2019-07-05 09:50:17
51.83.149.212 attack
Reported by AbuseIPDB proxy server.
2019-07-05 09:34:21
168.228.148.132 attack
failed_logins
2019-07-05 09:35:54
209.97.161.222 attackbotsspam
209.97.161.222 - - \[05/Jul/2019:00:53:45 +0200\] "POST /wp-login.php HTTP/1.1" 200 2110 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
209.97.161.222 - - \[05/Jul/2019:00:53:58 +0200\] "POST /wp-login.php HTTP/1.1" 200 2096 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-07-05 10:01:59
185.222.211.66 attack
400 BAD REQUEST
2019-07-05 09:26:56
117.50.7.159 attackspambots
Automatic report - Web App Attack
2019-07-05 09:39:02
77.82.90.20 attack
Sending SPAM email
2019-07-05 09:47:11
218.249.232.178 attackbots
Brute force attack stopped by firewall
2019-07-05 09:40:14
96.69.10.237 attack
Jul  5 00:57:15 mail sshd\[16039\]: Failed password for invalid user ansible from 96.69.10.237 port 53620 ssh2
Jul  5 01:13:15 mail sshd\[16176\]: Invalid user duo from 96.69.10.237 port 32834
Jul  5 01:13:15 mail sshd\[16176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.69.10.237
...
2019-07-05 10:00:56
182.61.170.251 attackbots
Jul  5 03:01:00 rpi sshd[20146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.170.251 
Jul  5 03:01:02 rpi sshd[20146]: Failed password for invalid user exploit from 182.61.170.251 port 32864 ssh2
2019-07-05 09:24:02
81.22.45.219 attackbotsspam
05.07.2019 01:46:18 Connection to port 10010 blocked by firewall
2019-07-05 09:58:33
37.49.225.77 attackspambots
Brute force attack stopped by firewall
2019-07-05 09:28:29
116.92.233.140 attackbots
Port scan: Attack repeated for 24 hours
2019-07-05 09:43:52

Recently Reported IPs

161.39.79.87 205.209.140.138 9.137.114.139 205.249.80.204
97.64.152.69 192.134.249.117 223.245.213.158 205.172.66.58
98.184.54.60 13.251.180.218 116.82.194.85 213.174.69.101
94.94.36.177 198.143.60.41 95.171.108.94 13.26.204.174
106.112.57.162 4.25.211.239 201.78.143.1 222.223.239.202