Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Beijing

Region: Beijing

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.126.194.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51533
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.126.194.139.		IN	A

;; AUTHORITY SECTION:
.			259	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024081402 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Aug 15 12:21:50 CST 2024
;; MSG SIZE  rcvd: 108
Host info
Host 139.194.126.112.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.194.126.112.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.220.101.145 attack
Automatic report - Banned IP Access
2020-08-27 12:09:15
213.0.69.74 attackbots
Aug 27 02:06:30 sip sshd[1650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.0.69.74
Aug 27 02:06:32 sip sshd[1650]: Failed password for invalid user www from 213.0.69.74 port 52280 ssh2
Aug 27 02:15:50 sip sshd[4111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.0.69.74
2020-08-27 10:20:46
88.10.202.231 attack
Unauthorized connection attempt from IP address 88.10.202.231 on Port 445(SMB)
2020-08-27 10:27:15
176.120.220.199 attackspam
Dovecot Invalid User Login Attempt.
2020-08-27 12:26:19
118.174.29.89 attack
Brute forcing RDP port 3389
2020-08-27 12:03:40
185.63.253.200 proxy
Ayo lahhwdiosiarhdjoaishenfoOabfj
2020-08-27 11:12:53
153.124.169.9 attack
Port probing on unauthorized port 5555
2020-08-27 12:25:04
34.91.106.225 attackspam
34.91.106.225 - - [27/Aug/2020:04:57:24 +0100] "POST /wp-login.php HTTP/1.1" 200 1861 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
34.91.106.225 - - [27/Aug/2020:04:57:24 +0100] "POST /wp-login.php HTTP/1.1" 200 1839 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
34.91.106.225 - - [27/Aug/2020:04:57:25 +0100] "POST /wp-login.php HTTP/1.1" 200 1845 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-27 12:13:45
157.45.70.47 attackspam
Port scan on 18 Aug 20.
2020-08-27 10:29:47
202.91.86.234 attackspambots
Dovecot Invalid User Login Attempt.
2020-08-27 12:19:28
185.243.51.30 attackbots
port scan and connect, tcp 80 (http)
2020-08-27 12:25:18
198.57.247.140 attackspam
$f2bV_matches
2020-08-27 12:16:46
222.186.180.130 attackspambots
Aug 27 06:05:53 abendstille sshd\[16067\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130  user=root
Aug 27 06:05:54 abendstille sshd\[16067\]: Failed password for root from 222.186.180.130 port 53475 ssh2
Aug 27 06:06:02 abendstille sshd\[16115\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130  user=root
Aug 27 06:06:04 abendstille sshd\[16115\]: Failed password for root from 222.186.180.130 port 11891 ssh2
Aug 27 06:06:11 abendstille sshd\[16227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130  user=root
...
2020-08-27 12:18:33
198.245.49.22 attackbots
198.245.49.22 - - [27/Aug/2020:05:32:55 +0200] "POST /xmlrpc.php HTTP/1.1" 403 146 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
198.245.49.22 - - [27/Aug/2020:05:57:10 +0200] "POST /xmlrpc.php HTTP/1.1" 403 146 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-27 12:20:29
164.132.49.140 attackspam
" "
2020-08-27 10:23:32

Recently Reported IPs

112.126.181.102 112.126.171.29 112.126.167.61 112.126.234.109
112.126.142.139 112.126.136.42 112.126.206.221 112.126.134.140
112.126.127.237 112.126.128.121 112.126.152.233 112.126.109.0
112.126.157.232 112.126.114.170 112.126.148.200 112.126.158.165
112.126.104.79 112.126.120.160 112.125.95.186 112.125.74.239