Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: China Unicom

Hostname: unknown

Organization: CHINA UNICOM China169 Backbone

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.139.217.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30038
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;116.139.217.9.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081400 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Aug 15 04:35:28 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 9.217.139.116.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 9.217.139.116.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
182.105.99.141 attackbots
[portscan] Port scan
2020-06-13 04:47:39
218.92.0.191 attackspam
Jun 12 20:46:19 cdc sshd[10330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.191  user=root
Jun 12 20:46:21 cdc sshd[10330]: Failed password for invalid user root from 218.92.0.191 port 34200 ssh2
2020-06-13 04:29:59
187.112.69.187 attack
Unauthorized connection attempt from IP address 187.112.69.187 on Port 445(SMB)
2020-06-13 04:22:53
219.250.188.107 attackspam
Jun 12 20:15:31 h2646465 sshd[1716]: Invalid user pany from 219.250.188.107
Jun 12 20:15:31 h2646465 sshd[1716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.250.188.107
Jun 12 20:15:31 h2646465 sshd[1716]: Invalid user pany from 219.250.188.107
Jun 12 20:15:32 h2646465 sshd[1716]: Failed password for invalid user pany from 219.250.188.107 port 40744 ssh2
Jun 12 20:20:38 h2646465 sshd[2013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.250.188.107  user=root
Jun 12 20:20:39 h2646465 sshd[2013]: Failed password for root from 219.250.188.107 port 35003 ssh2
Jun 12 20:21:40 h2646465 sshd[2041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.250.188.107  user=root
Jun 12 20:21:42 h2646465 sshd[2041]: Failed password for root from 219.250.188.107 port 41789 ssh2
Jun 12 20:22:43 h2646465 sshd[2078]: Invalid user usuario from 219.250.188.107
...
2020-06-13 04:35:17
51.79.66.198 attackspambots
Jun 12 19:51:05 mout sshd[18675]: Invalid user freedom from 51.79.66.198 port 49642
2020-06-13 04:33:56
190.73.161.105 attackbotsspam
Unauthorized connection attempt from IP address 190.73.161.105 on Port 445(SMB)
2020-06-13 04:13:51
193.112.123.100 attackbotsspam
20 attempts against mh-ssh on cloud
2020-06-13 04:39:45
86.101.56.141 attackspam
Jun 13 01:16:20 webhost01 sshd[14309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.101.56.141
Jun 13 01:16:22 webhost01 sshd[14309]: Failed password for invalid user teste from 86.101.56.141 port 58852 ssh2
...
2020-06-13 04:49:35
112.5.172.26 attackspambots
Jun 12 20:45:26 lukav-desktop sshd\[16722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.5.172.26  user=root
Jun 12 20:45:28 lukav-desktop sshd\[16722\]: Failed password for root from 112.5.172.26 port 21482 ssh2
Jun 12 20:46:01 lukav-desktop sshd\[16726\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.5.172.26  user=root
Jun 12 20:46:03 lukav-desktop sshd\[16726\]: Failed password for root from 112.5.172.26 port 38846 ssh2
Jun 12 20:46:37 lukav-desktop sshd\[16737\]: Invalid user prueba from 112.5.172.26
2020-06-13 04:40:38
185.176.27.210 attackbots
TCP port : 3978
2020-06-13 04:20:54
178.33.45.156 attack
Jun 12 17:21:43 *** sshd[26676]: Invalid user vps from 178.33.45.156
2020-06-13 04:36:09
183.83.145.117 attackspambots
Unauthorized connection attempt from IP address 183.83.145.117 on Port 445(SMB)
2020-06-13 04:20:16
142.93.140.242 attack
$f2bV_matches
2020-06-13 04:30:44
62.103.77.120 attackspambots
IP 62.103.77.120 attacked honeypot on port: 81 at 6/12/2020 5:44:18 PM
2020-06-13 04:51:16
218.78.35.157 attackspambots
Brute-force attempt banned
2020-06-13 04:49:06

Recently Reported IPs

221.34.224.71 57.99.15.253 218.188.57.149 21.222.182.71
62.161.237.110 139.96.172.79 46.143.204.224 137.181.77.56
159.144.73.17 105.32.187.239 223.20.237.223 39.35.90.103
5.94.26.238 203.87.77.98 156.164.181.235 143.47.255.44
76.96.194.208 4.235.201.112 188.207.58.98 201.234.22.36