Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.159.231.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25409
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.159.231.248.		IN	A

;; AUTHORITY SECTION:
.			566	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:05:41 CST 2022
;; MSG SIZE  rcvd: 108
Host info
248.231.159.139.in-addr.arpa domain name pointer ecs-139-159-231-248.compute.hwclouds-dns.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
248.231.159.139.in-addr.arpa	name = ecs-139-159-231-248.compute.hwclouds-dns.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
163.172.215.183 attack
Automatic report - XMLRPC Attack
2019-10-05 18:30:51
124.30.44.214 attack
Oct  5 11:46:44 mail sshd\[2708\]: Invalid user Alpes_123 from 124.30.44.214
Oct  5 11:46:44 mail sshd\[2708\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.30.44.214
Oct  5 11:46:46 mail sshd\[2708\]: Failed password for invalid user Alpes_123 from 124.30.44.214 port 17292 ssh2
2019-10-05 18:08:01
81.22.45.73 attackspam
10/05/2019-10:27:56.283974 81.22.45.73 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-05 18:27:04
137.226.113.31 attackbotsspam
443/udp 443/udp 443/udp...
[2019-08-05/10-05]132pkt,1pt.(udp)
2019-10-05 18:43:21
185.175.93.101 attackspam
Multiport scan : 15 ports scanned 5922 5923 5924 5925 5926 5927 5928 5929 5930 5931(x2) 5932 5933 5934(x2) 5935 5937(x2)
2019-10-05 18:42:57
221.195.234.108 attackbots
no
2019-10-05 18:14:26
27.105.103.3 attackbots
Oct  5 07:03:04 www sshd\[3012\]: Invalid user 123Sporting from 27.105.103.3
Oct  5 07:03:04 www sshd\[3012\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.105.103.3
Oct  5 07:03:06 www sshd\[3012\]: Failed password for invalid user 123Sporting from 27.105.103.3 port 57580 ssh2
...
2019-10-05 18:29:38
164.77.119.18 attackbots
Oct  5 03:45:45 www_kotimaassa_fi sshd[29457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.77.119.18
Oct  5 03:45:47 www_kotimaassa_fi sshd[29457]: Failed password for invalid user Debian1234 from 164.77.119.18 port 58780 ssh2
...
2019-10-05 18:29:16
187.167.67.187 attack
Automatic report - Port Scan Attack
2019-10-05 18:26:07
222.173.30.130 attack
2019-10-05T04:12:42.2406981495-001 sshd\[64458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.173.30.130  user=root
2019-10-05T04:12:44.2933951495-001 sshd\[64458\]: Failed password for root from 222.173.30.130 port 44507 ssh2
2019-10-05T04:17:23.1738161495-001 sshd\[64713\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.173.30.130  user=root
2019-10-05T04:17:25.4685791495-001 sshd\[64713\]: Failed password for root from 222.173.30.130 port 53513 ssh2
2019-10-05T04:21:50.2150441495-001 sshd\[65001\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.173.30.130  user=root
2019-10-05T04:21:51.8321001495-001 sshd\[65001\]: Failed password for root from 222.173.30.130 port 44244 ssh2
...
2019-10-05 18:28:20
167.114.55.84 attackspambots
Oct  5 00:10:52 hanapaa sshd\[427\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip84.ip-167-114-55.net  user=root
Oct  5 00:10:54 hanapaa sshd\[427\]: Failed password for root from 167.114.55.84 port 48280 ssh2
Oct  5 00:14:56 hanapaa sshd\[789\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip84.ip-167-114-55.net  user=root
Oct  5 00:14:58 hanapaa sshd\[789\]: Failed password for root from 167.114.55.84 port 60594 ssh2
Oct  5 00:19:03 hanapaa sshd\[1144\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip84.ip-167-114-55.net  user=root
2019-10-05 18:41:37
106.51.98.159 attackspambots
Oct  5 12:14:15 v22019058497090703 sshd[5261]: Failed password for root from 106.51.98.159 port 45684 ssh2
Oct  5 12:19:02 v22019058497090703 sshd[5631]: Failed password for root from 106.51.98.159 port 57668 ssh2
...
2019-10-05 18:35:43
2.133.70.201 attackbots
Oct  4 22:25:08 mailman postfix/smtpd[3769]: NOQUEUE: reject: RCPT from unknown[2.133.70.201]: 554 5.7.1 Service unavailable; Client host [2.133.70.201] blocked using sbl-xbl.spamhaus.org; https://www.spamhaus.org/query/ip/2.133.70.201 / https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=<[2.133.70.201]>
Oct  4 22:46:06 mailman postfix/smtpd[3938]: NOQUEUE: reject: RCPT from unknown[2.133.70.201]: 554 5.7.1 Service unavailable; Client host [2.133.70.201] blocked using sbl-xbl.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/2.133.70.201; from= to= proto=ESMTP helo=<[2.133.70.201]>
2019-10-05 18:20:34
222.186.173.142 attackspambots
DATE:2019-10-05 12:07:22, IP:222.186.173.142, PORT:ssh SSH brute force auth on honeypot server (honey-neo-dc-bis)
2019-10-05 18:22:27
54.38.33.186 attackbotsspam
Invalid user ronjones from 54.38.33.186 port 44304
2019-10-05 18:14:40

Recently Reported IPs

139.159.228.100 118.212.105.80 139.159.235.57 139.159.228.23
139.159.229.178 139.159.234.124 139.159.231.74 139.159.237.120
139.159.233.71 139.159.235.78 139.159.237.11 118.212.105.82
139.159.238.92 139.159.243.78 139.159.238.180 139.159.241.158
15.212.250.102 139.159.246.165 139.159.246.33 139.159.243.86