Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '1.39.0.0 - 1.39.255.255'

% Abuse contact for '1.39.0.0 - 1.39.255.255' is 'vilapnicspoc@vodafoneidea.com'

inetnum:        1.39.0.0 - 1.39.255.255
netname:        DelhiOpenInternetAccessAPN
descr:          Vodafone Essar Limited GPRS service
country:        IN
admin-c:        VAS1-AP
tech-c:         VAS1-AP
abuse-c:        AV319-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-VIL-IN
mnt-irt:        IRT-VIL-IN
last-modified:  2023-03-22T06:09:35Z
source:         APNIC

irt:            IRT-VIL-IN
address:        Q City,Block-B, Part-2nd Floor, Hyderabad - Telangana 500032
address:
phone:          +919619218372
e-mail:         saji.samuel@vodafoneidea.com
abuse-mailbox:  vilapnicspoc@vodafoneidea.com
admin-c:        VAS1-AP
tech-c:         VAS1-AP
auth:           # Filtered
remarks:        saji.samuel@vodafoneidea.com
remarks:        saji.samuel@vodafoneidea.com
remarks:        saji.samuel@vodafoneidea.com was validated on 2025-10-27
remarks:        vilapnicspoc@vodafoneidea.com was validated on 2025-10-30
mnt-by:         MAINT-VIL-IN
last-modified:  2026-01-21T10:29:12Z
source:         APNIC

role:           ABUSE VILIN
country:        ZZ
address:        Q City,Block-B, Part-2nd Floor, Hyderabad - Telangana 500032
address:
phone:          +919619218372
e-mail:         saji.samuel@vodafoneidea.com
admin-c:        VAS1-AP
tech-c:         VAS1-AP
nic-hdl:        AV319-AP
remarks:        Generated from irt object IRT-VIL-IN
remarks:        saji.samuel@vodafoneidea.com was validated on 2025-10-27
remarks:        vilapnicspoc@vodafoneidea.com was validated on 2025-10-30
abuse-mailbox:  vilapnicspoc@vodafoneidea.com
mnt-by:         APNIC-ABUSE
last-modified:  2026-01-21T10:41:35Z
source:         APNIC

person:         VIL APNIC SCOPE
address:        10th Flr,Birla Centurion,Pandurkar Bhudkar Marg,Prabhadevi, Mumbai Maharashtra 400030
country:        IN
phone:          +912071102509
e-mail:         vilapnicspoc@vodafoneidea.com
nic-hdl:        VAS1-AP
mnt-by:         MAINT-VIL-IN
last-modified:  2024-01-31T10:08:35Z
source:         APNIC

% Information related to '1.39.0.0/17AS38266'

route:          1.39.0.0/17
descr:          Vodafone Essar Limited-Value Added Services ,India
origin:         AS38266
country:        IN
notify:         mailbox.cno@vodafone.com
mnt-by:         MAINT-VIL-IN
last-modified:  2023-03-22T05:27:21Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.39.0.163
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22766
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.39.0.163.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026033002 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 31 09:29:52 CST 2026
;; MSG SIZE  rcvd: 103
Host info
Host 163.0.39.1.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 163.0.39.1.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
114.235.87.195 attackbots
Lines containing failures of 114.235.87.195
Jul 29 22:30:30 shared07 sshd[7695]: Invalid user orgiast from 114.235.87.195 port 50763
Jul 29 22:30:30 shared07 sshd[7695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.235.87.195
Jul 29 22:30:32 shared07 sshd[7695]: Failed password for invalid user orgiast from 114.235.87.195 port 50763 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=114.235.87.195
2020-07-30 04:47:09
124.156.102.254 attackbots
Jul 30 01:46:39 dhoomketu sshd[2011819]: Invalid user guodaojing from 124.156.102.254 port 42830
Jul 30 01:46:39 dhoomketu sshd[2011819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.102.254 
Jul 30 01:46:39 dhoomketu sshd[2011819]: Invalid user guodaojing from 124.156.102.254 port 42830
Jul 30 01:46:41 dhoomketu sshd[2011819]: Failed password for invalid user guodaojing from 124.156.102.254 port 42830 ssh2
Jul 30 01:51:33 dhoomketu sshd[2011884]: Invalid user vmadmin from 124.156.102.254 port 38794
...
2020-07-30 04:32:21
111.229.203.86 attackbotsspam
Jul 29 22:23:09 rotator sshd\[31170\]: Invalid user qhbz from 111.229.203.86Jul 29 22:23:10 rotator sshd\[31170\]: Failed password for invalid user qhbz from 111.229.203.86 port 55372 ssh2Jul 29 22:25:56 rotator sshd\[31946\]: Invalid user tmatare from 111.229.203.86Jul 29 22:25:58 rotator sshd\[31946\]: Failed password for invalid user tmatare from 111.229.203.86 port 43940 ssh2Jul 29 22:28:40 rotator sshd\[31985\]: Invalid user dudeqing from 111.229.203.86Jul 29 22:28:42 rotator sshd\[31985\]: Failed password for invalid user dudeqing from 111.229.203.86 port 60734 ssh2
...
2020-07-30 04:48:33
61.74.234.245 attack
Fail2Ban Ban Triggered
2020-07-30 04:39:21
190.13.173.67 attack
2020-07-29T20:28:55.581488vps-d63064a2 sshd[139973]: Invalid user chaijie from 190.13.173.67 port 34766
2020-07-29T20:28:55.593253vps-d63064a2 sshd[139973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.13.173.67
2020-07-29T20:28:55.581488vps-d63064a2 sshd[139973]: Invalid user chaijie from 190.13.173.67 port 34766
2020-07-29T20:28:57.963861vps-d63064a2 sshd[139973]: Failed password for invalid user chaijie from 190.13.173.67 port 34766 ssh2
...
2020-07-30 04:34:33
111.72.195.169 attack
Jul 29 22:18:02 srv01 postfix/smtpd\[967\]: warning: unknown\[111.72.195.169\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 29 22:21:31 srv01 postfix/smtpd\[27488\]: warning: unknown\[111.72.195.169\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 29 22:28:28 srv01 postfix/smtpd\[6249\]: warning: unknown\[111.72.195.169\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 29 22:28:39 srv01 postfix/smtpd\[6249\]: warning: unknown\[111.72.195.169\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 29 22:28:55 srv01 postfix/smtpd\[6249\]: warning: unknown\[111.72.195.169\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-30 04:35:56
87.98.156.62 attack
Jul 29 22:28:47 buvik sshd[32432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.98.156.62
Jul 29 22:28:49 buvik sshd[32432]: Failed password for invalid user admin from 87.98.156.62 port 52440 ssh2
Jul 29 22:28:50 buvik sshd[32434]: Invalid user admin from 87.98.156.62
...
2020-07-30 04:42:46
176.74.13.170 attackspam
Jul 29 16:28:30 mail sshd\[42408\]: Invalid user duanli from 176.74.13.170
Jul 29 16:28:30 mail sshd\[42408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.74.13.170
...
2020-07-30 04:57:27
163.172.136.227 attackspam
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-07-30 04:46:15
51.178.138.1 attackspam
Jul 29 22:42:05 buvik sshd[2085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.138.1
Jul 29 22:42:08 buvik sshd[2085]: Failed password for invalid user tbjeong from 51.178.138.1 port 46228 ssh2
Jul 29 22:46:40 buvik sshd[2739]: Invalid user webdev from 51.178.138.1
...
2020-07-30 04:49:47
59.163.102.4 attackbotsspam
Jul 29 22:50:44 icinga sshd[54299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.163.102.4 
Jul 29 22:50:46 icinga sshd[54299]: Failed password for invalid user peng from 59.163.102.4 port 58578 ssh2
Jul 29 22:54:56 icinga sshd[61218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.163.102.4 
...
2020-07-30 05:00:12
51.77.163.177 attackspam
Jul 29 14:22:00 server1 sshd\[6206\]: Invalid user zisen from 51.77.163.177
Jul 29 14:22:00 server1 sshd\[6206\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.163.177 
Jul 29 14:22:02 server1 sshd\[6206\]: Failed password for invalid user zisen from 51.77.163.177 port 58216 ssh2
Jul 29 14:29:01 server1 sshd\[8325\]: Invalid user linguoping from 51.77.163.177
Jul 29 14:29:01 server1 sshd\[8325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.163.177 
...
2020-07-30 04:43:06
222.85.140.116 attackspambots
$f2bV_matches
2020-07-30 04:43:30
116.236.109.92 attackbotsspam
port scan and connect, tcp 1433 (ms-sql-s)
2020-07-30 04:45:25
104.183.217.130 attackbotsspam
2020-07-29T22:28:55+0200 Failed SSH Authentication/Brute Force Attack. (Server 4)
2020-07-30 04:37:54

Recently Reported IPs

66.132.186.165 147.139.136.75 39.98.62.128 2606:4700:10::6816:930
2606:4700:10::6814:5372 2606:4700:10::6816:2228 2606:4700:10::ac43:2246 121.8.28.49
2606:4700:10::6816:3588 2606:4700:10::6814:5047 2606:4700:10::6814:5614 111.231.213.107
51.85.43.116 51.107.85.44 182.138.158.82 175.30.48.63
123.178.210.194 110.77.187.51 134.35.157.71 2606:4700:10::6814:4699