Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.158.139.126
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24789
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.158.139.126.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030802 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 09 13:00:41 CST 2025
;; MSG SIZE  rcvd: 108
Host info
126.139.158.116.in-addr.arpa domain name pointer hn.kd.ny.adsl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
126.139.158.116.in-addr.arpa	name = hn.kd.ny.adsl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
133.130.113.128 attackspam
Oct 15 21:22:01 *** sshd[14252]: User root from 133.130.113.128 not allowed because not listed in AllowUsers
2019-10-16 07:04:00
81.22.45.51 attackspambots
10/15/2019-18:07:14.295344 81.22.45.51 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-16 07:14:24
222.186.180.17 attackbotsspam
Oct 16 00:58:24 MK-Soft-Root1 sshd[15271]: Failed password for root from 222.186.180.17 port 6352 ssh2
Oct 16 00:58:29 MK-Soft-Root1 sshd[15271]: Failed password for root from 222.186.180.17 port 6352 ssh2
...
2019-10-16 06:58:45
109.190.153.178 attackbotsspam
$f2bV_matches
2019-10-16 06:53:59
39.64.193.37 attack
Oct 15 19:54:44 localhost sshd\[130210\]: Invalid user pi from 39.64.193.37 port 51920
Oct 15 19:54:44 localhost sshd\[130211\]: Invalid user pi from 39.64.193.37 port 51918
Oct 15 19:54:44 localhost sshd\[130210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.64.193.37
Oct 15 19:54:44 localhost sshd\[130211\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.64.193.37
Oct 15 19:54:46 localhost sshd\[130210\]: Failed password for invalid user pi from 39.64.193.37 port 51920 ssh2
...
2019-10-16 07:03:29
112.64.32.118 attackbotsspam
Oct 15 22:30:57 localhost sshd\[15979\]: Invalid user apache from 112.64.32.118 port 40020
Oct 15 22:30:57 localhost sshd\[15979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.64.32.118
Oct 15 22:30:58 localhost sshd\[15979\]: Failed password for invalid user apache from 112.64.32.118 port 40020 ssh2
2019-10-16 07:18:56
211.195.117.212 attackspam
Oct 15 23:43:22 v22018076622670303 sshd\[25989\]: Invalid user 000 from 211.195.117.212 port 34578
Oct 15 23:43:22 v22018076622670303 sshd\[25989\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.195.117.212
Oct 15 23:43:24 v22018076622670303 sshd\[25989\]: Failed password for invalid user 000 from 211.195.117.212 port 34578 ssh2
...
2019-10-16 07:10:48
137.74.173.182 attack
Automatic report - Banned IP Access
2019-10-16 07:15:57
211.159.152.252 attack
$f2bV_matches
2019-10-16 07:23:47
181.225.3.64 attackbotsspam
Automatic report - Port Scan Attack
2019-10-16 07:22:09
89.3.140.140 attackbotsspam
*Port Scan* detected from 89.3.140.140 (FR/France/ip-140.net-89-3-140.rev.numericable.fr). 4 hits in the last 215 seconds
2019-10-16 07:07:05
86.163.38.176 attack
37215/tcp
[2019-10-14/15]2pkt
2019-10-16 06:50:52
82.117.190.170 attackbots
2019-10-15T20:26:14.660401abusebot-4.cloudsearch.cf sshd\[30794\]: Invalid user Varma from 82.117.190.170 port 58653
2019-10-16 07:01:12
84.17.60.130 attackbots
0,52-00/00 [bc02/m59] PostRequest-Spammer scoring: brussels
2019-10-16 06:49:40
45.226.117.194 attackbotsspam
Oct 12 01:48:09 localhost postfix/smtpd[31484]: lost connection after EHLO from unknown[45.226.117.194]
Oct 12 01:48:09 localhost postfix/smtpd[31484]: lost connection after EHLO from unknown[45.226.117.194]
Oct 12 01:48:09 localhost postfix/smtpd[31484]: lost connection after EHLO from unknown[45.226.117.194]
Oct 12 01:48:09 localhost postfix/smtpd[31484]: lost connection after EHLO from unknown[45.226.117.194]
Oct 12 01:48:10 localhost postfix/smtpd[31484]: lost connection after EHLO from unknown[45.226.117.194]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=45.226.117.194
2019-10-16 06:54:44

Recently Reported IPs

55.64.176.193 58.254.81.30 138.184.10.189 181.63.10.29
25.95.17.165 146.224.10.187 75.243.229.250 190.59.235.202
127.156.231.85 16.105.110.25 164.226.227.228 33.208.78.246
35.100.169.72 39.25.152.204 32.77.151.109 52.206.128.194
200.241.246.244 63.203.232.237 178.229.221.28 107.99.139.59