Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.142.147.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48234
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;122.142.147.139.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 01:21:51 CST 2025
;; MSG SIZE  rcvd: 108
Host info
139.147.142.122.in-addr.arpa domain name pointer 139.147.142.122.adsl-pool.jlccptt.net.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.147.142.122.in-addr.arpa	name = 139.147.142.122.adsl-pool.jlccptt.net.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
101.78.20.142 attackspambots
Unauthorized connection attempt detected from IP address 101.78.20.142 to port 80 [J]
2020-02-23 21:30:22
18.217.248.224 attack
lfd: (smtpauth) Failed SMTP AUTH login from 18.217.248.224 (ec2-18-217-248-224.us-east-2.compute.amazonaws.com): 5 in the last 3600 secs - Thu Jun 28 07:55:59 2018
2020-02-23 21:48:45
154.70.200.218 attack
lfd: (smtpauth) Failed SMTP AUTH login from 154.70.200.218 (MA/Morocco/-): 5 in the last 3600 secs - Sat Jun 30 03:49:50 2018
2020-02-23 21:32:04
61.187.147.92 attackspambots
Brute force blocker - service: proftpd1, proftpd2 - aantal: 58 - Thu Jun 28 19:40:15 2018
2020-02-23 21:46:25
134.209.18.220 attackbotsspam
SSH Brute-Forcing (server2)
2020-02-23 21:23:00
62.210.181.138 attack
Brute force blocker - service: exim2 - aantal: 25 - Thu Jun 28 06:35:16 2018
2020-02-23 22:01:11
178.62.108.111 attackbotsspam
Feb 23 14:23:15 server sshd[349933]: Failed password for invalid user jira from 178.62.108.111 port 35508 ssh2
Feb 23 14:26:09 server sshd[351648]: Failed password for invalid user wangxm from 178.62.108.111 port 35812 ssh2
Feb 23 14:29:06 server sshd[353474]: Failed password for invalid user ncuser from 178.62.108.111 port 36116 ssh2
2020-02-23 21:44:28
222.186.30.248 attackbotsspam
Fail2Ban Ban Triggered (2)
2020-02-23 21:44:08
222.221.173.90 attackspam
Brute force blocker - service: proftpd1, proftpd2 - aantal: 34 - Thu Jun 28 12:10:16 2018
2020-02-23 21:43:38
154.70.200.195 attackbots
lfd: (smtpauth) Failed SMTP AUTH login from 154.70.200.195 (MA/Morocco/-): 5 in the last 3600 secs - Sat Jun 30 04:45:57 2018
2020-02-23 21:33:03
139.212.58.235 attack
Brute force blocker - service: proftpd1 - aantal: 57 - Wed Jun 27 14:15:16 2018
2020-02-23 22:07:45
80.210.28.9 attackbotsspam
DATE:2020-02-23 14:28:57, IP:80.210.28.9, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-02-23 22:03:49
117.90.0.94 attack
lfd: (smtpauth) Failed SMTP AUTH login from 117.90.0.94 (94.0.90.117.broad.zj.js.dynamic.163data.com.cn): 5 in the last 3600 secs - Thu Jun 28 19:10:18 2018
2020-02-23 21:53:28
115.87.117.55 attack
Unauthorized connection attempt detected from IP address 115.87.117.55 to port 23 [J]
2020-02-23 21:26:45
49.89.217.54 attackspam
Brute force blocker - service: proftpd1 - aantal: 155 - Thu Jun 28 04:55:16 2018
2020-02-23 22:05:25

Recently Reported IPs

45.142.193.31 32.72.216.190 79.233.13.115 72.233.2.81
251.46.195.119 250.162.11.170 192.20.4.45 252.60.110.195
201.123.52.151 189.167.50.117 126.15.213.73 128.142.135.34
68.137.39.229 241.121.156.241 33.143.242.219 179.83.122.0
128.229.45.56 5.208.66.198 13.44.185.55 24.68.68.38