Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.159.234.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49565
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.159.234.124.		IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:05:41 CST 2022
;; MSG SIZE  rcvd: 108
Host info
124.234.159.139.in-addr.arpa domain name pointer ecs-139-159-234-124.compute.hwclouds-dns.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
124.234.159.139.in-addr.arpa	name = ecs-139-159-234-124.compute.hwclouds-dns.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
156.96.59.24 attackbots
Time:     Mon Aug 10 17:12:08 2020 -0300
IP:       156.96.59.24 (US/United States/-)
Failures: 30 (smtpauth)
Interval: 3600 seconds
Blocked:  Permanent Block
2020-08-11 06:28:12
23.129.64.187 attackspam
Time:     Mon Aug 10 16:13:21 2020 -0400
IP:       23.129.64.187 (US/United States/-)
Failures: 5 (mod_security)
Interval: 3600 seconds
Blocked:  Permanent Block
2020-08-11 06:29:56
45.143.223.128 attack
Did not receive identification string
2020-08-11 06:51:50
187.63.37.135 attackspambots
Unauthorized connection attempt
IP: 187.63.37.135
Ports affected
    Message Submission (587) 
Abuse Confidence rating 36%
Found in DNSBL('s)
ASN Details
   AS28163 Cosmonline Informatica Ltda
   Brazil (BR)
   CIDR 187.63.32.0/20
Log Date: 10/08/2020 8:14:23 PM UTC
2020-08-11 06:35:10
116.235.131.148 attackspambots
Banned for a week because repeated abuses, for example SSH, but not only
2020-08-11 06:47:07
74.63.253.190 attack
FTP Brute Force.
2020-08-11 06:40:00
222.186.30.57 attack
Aug 10 23:46:38 rocket sshd[14490]: Failed password for root from 222.186.30.57 port 42154 ssh2
Aug 10 23:46:41 rocket sshd[14490]: Failed password for root from 222.186.30.57 port 42154 ssh2
Aug 10 23:46:44 rocket sshd[14490]: Failed password for root from 222.186.30.57 port 42154 ssh2
...
2020-08-11 06:48:46
201.50.158.78 attackbotsspam
Automatic report - Port Scan Attack
2020-08-11 06:30:34
222.186.30.76 attackspam
Aug 11 00:42:17 vps639187 sshd\[27204\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.76  user=root
Aug 11 00:42:19 vps639187 sshd\[27204\]: Failed password for root from 222.186.30.76 port 32204 ssh2
Aug 11 00:42:22 vps639187 sshd\[27204\]: Failed password for root from 222.186.30.76 port 32204 ssh2
...
2020-08-11 06:46:25
47.91.44.93 attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-08-11 06:20:18
220.124.240.66 attackspam
(imapd) Failed IMAP login from 220.124.240.66 (KR/South Korea/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Aug 11 01:00:03 ir1 dovecot[3110802]: imap-login: Disconnected (auth failed, 1 attempts in 5 secs): user=, method=PLAIN, rip=220.124.240.66, lip=5.63.12.44, TLS, session=
2020-08-11 06:24:01
143.255.140.232 attackspam
Unauthorized IMAP connection attempt
2020-08-11 06:21:49
220.133.215.58 attackspambots
Auto Detect Rule!
proto TCP (SYN), 220.133.215.58:18816->gjan.info:23, len 40
2020-08-11 06:25:47
36.80.189.115 attackbotsspam
Unauthorized connection attempt from IP address 36.80.189.115 on Port 445(SMB)
2020-08-11 06:14:12
163.172.161.31 attackbotsspam
Aug 10 06:01:36 finn sshd[6561]: Did not receive identification string from 163.172.161.31 port 43132
Aug 10 06:01:53 finn sshd[6575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.161.31  user=r.r
Aug 10 06:01:55 finn sshd[6575]: Failed password for r.r from 163.172.161.31 port 56586 ssh2
Aug 10 06:01:55 finn sshd[6575]: Received disconnect from 163.172.161.31 port 56586:11: Normal Shutdown, Thank you for playing [preauth]
Aug 10 06:01:55 finn sshd[6575]: Disconnected from 163.172.161.31 port 56586 [preauth]
Aug 10 06:02:10 finn sshd[6579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.161.31  user=r.r
Aug 10 06:02:12 finn sshd[6579]: Failed password for r.r from 163.172.161.31 port 33826 ssh2
Aug 10 06:02:12 finn sshd[6579]: Received disconnect from 163.172.161.31 port 33826:11: Normal Shutdown, Thank you for playing [preauth]
Aug 10 06:02:12 finn sshd[6579]: Disconnect........
-------------------------------
2020-08-11 06:43:38

Recently Reported IPs

139.159.229.178 139.159.231.74 139.159.237.120 139.159.233.71
139.159.235.78 139.159.237.11 118.212.105.82 139.159.238.92
139.159.243.78 139.159.238.180 139.159.241.158 15.212.250.102
139.159.246.165 139.159.246.33 139.159.243.86 139.159.250.142
139.159.251.160 139.159.250.209 139.159.246.39 118.212.105.85