Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.20.139.98
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43095
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.20.139.98.			IN	A

;; AUTHORITY SECTION:
.			48	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 16:35:41 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 98.139.20.1.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 98.139.20.1.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
84.17.51.142 attack
(From no-replynen@google.com) Gооd dаy! 
If you want to get ahead of your competition, have a higher Domain Authority score. Its just simple as that. 
With our service you get Domain Authority above 50 points in just 30 days. 
 
This service is guaranteed 
 
For more information, check our service here 
https://www.monkeydigital.co/Get-Guaranteed-Domain-Authority-50/ 
 
thank you 
Mike Ogden
 
Monkey Digital 
support@monkeydigital.co
2020-08-02 00:11:49
1.34.213.46 attack
HTTP/80/443/8080 Probe, BF, WP, Hack -
2020-08-01 23:51:12
96.57.105.245 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-08-01 23:47:13
194.55.234.159 attack
RDPBruteCAu
2020-08-01 23:29:39
160.34.9.48 attackbotsspam
Bad bot/spoofed identity
2020-08-01 23:54:24
112.85.42.89 attack
Aug  1 17:24:20 piServer sshd[16122]: Failed password for root from 112.85.42.89 port 49793 ssh2
Aug  1 17:24:24 piServer sshd[16122]: Failed password for root from 112.85.42.89 port 49793 ssh2
Aug  1 17:24:27 piServer sshd[16122]: Failed password for root from 112.85.42.89 port 49793 ssh2
...
2020-08-01 23:36:20
45.129.33.5 attackbotsspam
 TCP (SYN) 45.129.33.5:44601 -> port 4692, len 44
2020-08-01 23:52:11
110.225.94.65 attackspambots
Email rejected due to spam filtering
2020-08-02 00:21:32
37.49.224.49 attack
 TCP (SYN) 37.49.224.49:48346 -> port 50802, len 44
2020-08-01 23:53:57
103.109.14.94 attackbots
Aug  1 15:33:43 server postfix/smtpd[2491]: NOQUEUE: reject: RCPT from unknown[103.109.14.94]: 554 5.7.1 Service unavailable; Client host [103.109.14.94] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/103.109.14.94; from= to= proto=ESMTP helo=<[103.109.14.94]>
2020-08-02 00:14:13
1.54.34.55 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-08-01 23:58:42
59.127.16.75 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-08-01 23:29:20
142.44.161.132 attack
Bruteforce detected by fail2ban
2020-08-01 23:55:54
129.204.44.231 attackbots
SSH Brute Force
2020-08-01 23:46:41
113.226.198.167 attackbots
port 23
2020-08-02 00:18:45

Recently Reported IPs

103.135.248.145 103.135.227.198 103.135.249.22 103.135.248.80
103.135.227.218 103.135.24.2 103.135.227.32 103.135.249.253
103.135.227.46 103.135.227.43 103.135.251.212 1.20.140.112
103.135.227.235 103.135.251.57 103.135.38.103 103.135.38.100
103.135.38.1 103.135.38.105 103.135.38.106 103.135.38.111