Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.183.12.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12315
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.183.12.143.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012801 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 04:45:01 CST 2025
;; MSG SIZE  rcvd: 107
Host info
143.12.183.139.in-addr.arpa domain name pointer not-set.idodns.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
143.12.183.139.in-addr.arpa	name = not-set.idodns.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.156.73.49 attackspambots
firewall-block, port(s): 3635/tcp, 3649/tcp, 3673/tcp
2020-01-11 13:30:54
61.167.99.163 attackspambots
Jan 10 23:59:13 plusreed sshd[7074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.167.99.163  user=root
Jan 10 23:59:16 plusreed sshd[7074]: Failed password for root from 61.167.99.163 port 43602 ssh2
...
2020-01-11 13:20:08
190.121.146.178 attack
20/1/10@23:58:22: FAIL: Alarm-Network address from=190.121.146.178
20/1/10@23:58:22: FAIL: Alarm-Network address from=190.121.146.178
...
2020-01-11 13:49:35
157.245.180.127 attackspambots
3389BruteforceFW23
2020-01-11 13:47:01
1.180.72.186 attackspambots
Unauthorized connection attempt detected from IP address 1.180.72.186 to port 22 [T]
2020-01-11 13:21:34
89.239.194.168 attackspam
Jan 11 05:58:08 ArkNodeAT sshd\[15050\]: Invalid user mbsetupuser from 89.239.194.168
Jan 11 05:58:08 ArkNodeAT sshd\[15050\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.239.194.168
Jan 11 05:58:10 ArkNodeAT sshd\[15050\]: Failed password for invalid user mbsetupuser from 89.239.194.168 port 42150 ssh2
2020-01-11 13:56:27
222.186.15.91 attackbots
Jan 11 06:42:02 localhost sshd\[16228\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.91  user=root
Jan 11 06:42:04 localhost sshd\[16228\]: Failed password for root from 222.186.15.91 port 15770 ssh2
Jan 11 06:42:06 localhost sshd\[16228\]: Failed password for root from 222.186.15.91 port 15770 ssh2
2020-01-11 13:43:20
222.186.15.158 attack
Jan 11 06:44:01 h2177944 sshd\[23549\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.158  user=root
Jan 11 06:44:03 h2177944 sshd\[23549\]: Failed password for root from 222.186.15.158 port 49341 ssh2
Jan 11 06:44:06 h2177944 sshd\[23549\]: Failed password for root from 222.186.15.158 port 49341 ssh2
Jan 11 06:44:08 h2177944 sshd\[23549\]: Failed password for root from 222.186.15.158 port 49341 ssh2
...
2020-01-11 13:46:07
189.51.101.126 attackbots
Automatically reported by fail2ban report script (powermetal_old)
2020-01-11 13:45:25
46.229.168.143 attackspam
Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools
2020-01-11 13:54:27
222.186.175.202 attackbotsspam
2020-01-11T06:51:22.288468scmdmz1 sshd[2998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202  user=root
2020-01-11T06:51:24.609241scmdmz1 sshd[2998]: Failed password for root from 222.186.175.202 port 28522 ssh2
2020-01-11T06:51:27.237041scmdmz1 sshd[2998]: Failed password for root from 222.186.175.202 port 28522 ssh2
2020-01-11T06:51:22.288468scmdmz1 sshd[2998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202  user=root
2020-01-11T06:51:24.609241scmdmz1 sshd[2998]: Failed password for root from 222.186.175.202 port 28522 ssh2
2020-01-11T06:51:27.237041scmdmz1 sshd[2998]: Failed password for root from 222.186.175.202 port 28522 ssh2
2020-01-11T06:51:22.288468scmdmz1 sshd[2998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202  user=root
2020-01-11T06:51:24.609241scmdmz1 sshd[2998]: Failed password for root from 222.186.175.202 port 28522 ssh2
2
2020-01-11 13:57:51
35.234.67.163 attackbots
Automatic report - XMLRPC Attack
2020-01-11 13:23:53
89.208.16.141 attackspambots
1578718731 - 01/11/2020 05:58:51 Host: 89.208.16.141/89.208.16.141 Port: 445 TCP Blocked
2020-01-11 13:37:52
222.186.15.10 attackbots
Jan 11 06:35:22 vmanager6029 sshd\[28732\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.10  user=root
Jan 11 06:35:24 vmanager6029 sshd\[28732\]: Failed password for root from 222.186.15.10 port 12683 ssh2
Jan 11 06:35:50 vmanager6029 sshd\[28741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.10  user=root
2020-01-11 13:36:57
82.253.104.164 attackspambots
"Fail2Ban detected SSH brute force attempt"
2020-01-11 13:24:31

Recently Reported IPs

246.174.214.48 101.101.24.20 88.92.7.118 194.16.126.3
185.94.125.244 180.161.44.49 25.103.114.210 149.221.88.13
20.124.102.135 227.194.214.142 35.144.196.119 240.4.185.185
208.89.99.4 135.89.217.239 240.167.232.206 61.21.4.134
100.218.113.123 237.57.143.119 89.253.249.152 4.35.203.102