Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.139.39.185
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56405
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.139.39.185.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 10:09:10 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 185.39.139.117.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 185.39.139.117.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
198.148.110.126 attackbotsspam
445/tcp 445/tcp 445/tcp...
[2019-05-09/07-09]11pkt,1pt.(tcp)
2019-07-10 16:32:19
144.217.84.164 attackbotsspam
Jul 10 08:53:49 SilenceServices sshd[25510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.84.164
Jul 10 08:53:51 SilenceServices sshd[25510]: Failed password for invalid user ca from 144.217.84.164 port 34682 ssh2
Jul 10 08:56:16 SilenceServices sshd[27153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.84.164
2019-07-10 15:54:04
52.170.7.159 attackspambots
Jul 10 01:15:49 mail sshd[1464]: Invalid user cip from 52.170.7.159
Jul 10 01:15:49 mail sshd[1464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.170.7.159
Jul 10 01:15:49 mail sshd[1464]: Invalid user cip from 52.170.7.159
Jul 10 01:15:51 mail sshd[1464]: Failed password for invalid user cip from 52.170.7.159 port 52658 ssh2
...
2019-07-10 16:03:18
157.230.234.222 attackspam
Jul 10 04:05:13 srv-4 sshd\[1876\]: Invalid user test from 157.230.234.222
Jul 10 04:05:13 srv-4 sshd\[1876\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.234.222
Jul 10 04:05:15 srv-4 sshd\[1876\]: Failed password for invalid user test from 157.230.234.222 port 38816 ssh2
...
2019-07-10 16:19:02
116.96.174.247 attackbotsspam
37215/tcp 37215/tcp 37215/tcp...
[2019-06-29/07-09]6pkt,1pt.(tcp)
2019-07-10 16:29:28
152.169.204.74 attackspam
Jul  8 17:06:32 *** sshd[15484]: Invalid user rp from 152.169.204.74 port 23907
Jul  8 17:06:33 *** sshd[15484]: Failed password for invalid user rp from 152.169.204.74 port 23907 ssh2
Jul  8 17:06:34 *** sshd[15484]: Received disconnect from 152.169.204.74 port 23907:11: Bye Bye [preauth]
Jul  8 17:06:34 *** sshd[15484]: Disconnected from 152.169.204.74 port 23907 [preauth]
Jul  8 17:07:00 *** sshd[15870]: Invalid user rp from 152.169.204.74 port 32193
Jul  8 17:07:02 *** sshd[15870]: Failed password for invalid user rp from 152.169.204.74 port 32193 ssh2
Jul  8 17:07:02 *** sshd[15870]: Received disconnect from 152.169.204.74 port 32193:11: Bye Bye [preauth]
Jul  8 17:07:02 *** sshd[15870]: Disconnected from 152.169.204.74 port 32193 [preauth]
Jul  8 17:10:07 *** sshd[18230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.169.204.74  user=r.r
Jul  8 17:10:10 *** sshd[18230]: Failed password for r.r from 152.169.204.74 port ........
-------------------------------
2019-07-10 16:07:10
77.40.105.231 attackbotsspam
2019-07-10T09:26:41.096733MailD postfix/smtpd[6332]: warning: unknown[77.40.105.231]: SASL LOGIN authentication failed: authentication failure
2019-07-10T09:45:22.132876MailD postfix/smtpd[7613]: warning: unknown[77.40.105.231]: SASL LOGIN authentication failed: authentication failure
2019-07-10T09:48:18.540863MailD postfix/smtpd[7813]: warning: unknown[77.40.105.231]: SASL LOGIN authentication failed: authentication failure
2019-07-10 15:58:29
91.237.189.1 attackspam
[portscan] Port scan
2019-07-10 16:00:33
106.12.193.160 attackspam
Jul  9 23:40:05 localhost sshd\[65451\]: Invalid user myftp from 106.12.193.160 port 55284
Jul  9 23:40:05 localhost sshd\[65451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.193.160
Jul  9 23:40:07 localhost sshd\[65451\]: Failed password for invalid user myftp from 106.12.193.160 port 55284 ssh2
Jul  9 23:43:10 localhost sshd\[65597\]: Invalid user r from 106.12.193.160 port 54044
Jul  9 23:43:10 localhost sshd\[65597\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.193.160
...
2019-07-10 16:13:40
89.43.67.45 attack
445/tcp 445/tcp 445/tcp...
[2019-05-16/07-09]12pkt,1pt.(tcp)
2019-07-10 16:36:05
185.36.81.180 attackspam
Rude login attack (5 tries in 1d)
2019-07-10 16:13:09
114.44.52.149 attackbotsspam
37215/tcp 37215/tcp 37215/tcp...
[2019-07-07/09]4pkt,1pt.(tcp)
2019-07-10 16:12:15
129.211.119.36 attackspam
Automatic report - Web App Attack
2019-07-10 15:47:38
200.119.125.194 attackspambots
Unauthorized IMAP connection attempt
2019-07-10 15:48:28
46.161.27.42 attackspam
10.07.2019 07:38:20 Connection to port 1723 blocked by firewall
2019-07-10 16:12:37

Recently Reported IPs

20.224.230.219 154.35.55.115 182.0.74.151 85.110.27.159
18.6.8.115 84.232.40.254 119.45.88.198 108.126.59.78
168.54.71.230 229.2.98.15 117.160.21.41 224.97.160.106
196.180.95.239 236.70.213.26 169.233.225.13 128.170.138.108
233.43.176.208 33.174.138.97 177.160.211.74 201.201.182.149