Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Chengdu

Region: Sichuan

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.155.249.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15659
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.155.249.5.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030900 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 09 15:21:08 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 5.249.155.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 5.249.155.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
117.254.56.244 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 13-10-2019 12:55:24.
2019-10-13 21:25:24
174.93.145.249 attack
Sniffing for wp-login
2019-10-13 21:31:29
87.74.64.194 attack
Exploid host for vulnerabilities on 13-10-2019 12:55:35.
2019-10-13 21:06:50
116.31.99.143 attackspambots
*Port Scan* detected from 116.31.99.143 (CN/China/-). 4 hits in the last 40 seconds
2019-10-13 21:38:44
42.200.207.194 attackspambots
Exploid host for vulnerabilities on 13-10-2019 12:55:30.
2019-10-13 21:17:10
158.69.63.244 attackbots
Oct 13 13:08:40 game-panel sshd[28860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.63.244
Oct 13 13:08:42 game-panel sshd[28860]: Failed password for invalid user Royal@2017 from 158.69.63.244 port 34028 ssh2
Oct 13 13:12:23 game-panel sshd[29049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.63.244
2019-10-13 21:15:32
195.62.71.20 attackbots
2019-10-13T13:01:08.537163abusebot-4.cloudsearch.cf sshd\[17583\]: Invalid user Automatique2016 from 195.62.71.20 port 50766
2019-10-13 21:38:14
218.188.210.214 attack
Oct 13 14:55:29 jane sshd[13281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.188.210.214 
Oct 13 14:55:31 jane sshd[13281]: Failed password for invalid user Gerard!23 from 218.188.210.214 port 38658 ssh2
...
2019-10-13 21:28:23
34.205.50.72 attack
Exploid host for vulnerabilities on 13-10-2019 12:55:27.
2019-10-13 21:20:24
222.186.42.15 attackbots
Oct 13 15:26:49 andromeda sshd\[29723\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.15  user=root
Oct 13 15:26:50 andromeda sshd\[29723\]: Failed password for root from 222.186.42.15 port 29076 ssh2
Oct 13 15:26:53 andromeda sshd\[29723\]: Failed password for root from 222.186.42.15 port 29076 ssh2
2019-10-13 21:30:53
34.231.242.61 attackbots
Exploid host for vulnerabilities on 13-10-2019 12:55:28.
2019-10-13 21:20:01
43.245.218.177 attack
Exploid host for vulnerabilities on 13-10-2019 12:55:30.
2019-10-13 21:16:50
89.221.94.202 attackbotsspam
Exploid host for vulnerabilities on 13-10-2019 12:55:35.
2019-10-13 21:06:27
209.59.188.116 attackspam
Oct 13 14:05:49 [munged] sshd[16490]: Failed password for root from 209.59.188.116 port 49950 ssh2
2019-10-13 21:15:09
94.191.119.176 attackspam
(sshd) Failed SSH login from 94.191.119.176 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 13 13:36:20 server2 sshd[3080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.119.176  user=root
Oct 13 13:36:22 server2 sshd[3080]: Failed password for root from 94.191.119.176 port 47574 ssh2
Oct 13 13:48:43 server2 sshd[3320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.119.176  user=root
Oct 13 13:48:45 server2 sshd[3320]: Failed password for root from 94.191.119.176 port 53654 ssh2
Oct 13 13:54:55 server2 sshd[3468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.119.176  user=root
2019-10-13 21:40:53

Recently Reported IPs

140.4.98.235 229.8.124.90 189.223.253.142 184.61.104.59
93.187.59.208 141.85.169.31 48.198.212.237 47.141.73.74
139.226.150.78 182.168.149.221 82.150.1.43 57.51.157.223
22.243.83.63 169.82.132.105 155.109.114.19 252.132.121.41
178.57.79.18 42.182.236.253 69.14.60.242 128.43.235.102