Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.196.217.174
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3887
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.196.217.174.		IN	A

;; AUTHORITY SECTION:
.			428	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 12:38:22 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 174.217.196.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 174.217.196.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
197.25.182.251 spambotsattackproxynormal
ثنثنثنثن
2020-05-05 12:48:25
71.43.141.150 attackspam
Honeypot attack, port: 81, PTR: rrcs-71-43-141-150.se.biz.rr.com.
2020-05-05 12:40:51
101.89.127.14 attack
1588640972 - 05/05/2020 03:09:32 Host: 101.89.127.14/101.89.127.14 Port: 445 TCP Blocked
2020-05-05 12:42:35
218.92.0.205 attack
2020-05-04T22:22:58.333464xentho-1 sshd[103581]: Failed password for root from 218.92.0.205 port 34636 ssh2
2020-05-04T22:24:36.394025xentho-1 sshd[103631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.205  user=root
2020-05-04T22:24:38.000533xentho-1 sshd[103631]: Failed password for root from 218.92.0.205 port 39383 ssh2
2020-05-04T22:24:36.394025xentho-1 sshd[103631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.205  user=root
2020-05-04T22:24:38.000533xentho-1 sshd[103631]: Failed password for root from 218.92.0.205 port 39383 ssh2
2020-05-04T22:24:41.836532xentho-1 sshd[103631]: Failed password for root from 218.92.0.205 port 39383 ssh2
2020-05-04T22:24:36.394025xentho-1 sshd[103631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.205  user=root
2020-05-04T22:24:38.000533xentho-1 sshd[103631]: Failed password for root from 218.92
...
2020-05-05 12:18:08
160.124.140.136 attack
$f2bV_matches
2020-05-05 12:15:25
185.188.218.6 attack
$f2bV_matches
2020-05-05 12:34:04
108.183.151.208 attackspam
May  5 02:10:11 *** sshd[26844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.183.151.208  user=r.r
May  5 02:10:13 *** sshd[26844]: Failed password for r.r from 108.183.151.208 port 43610 ssh2
May  5 02:10:13 *** sshd[26844]: Received disconnect from 108.183.151.208 port 43610:11: Bye Bye [preauth]
May  5 02:10:13 *** sshd[26844]: Disconnected from 108.183.151.208 port 43610 [preauth]
May  5 03:09:55 *** sshd[27710]: Invalid user web from 108.183.151.208 port 33110
May  5 03:09:55 *** sshd[27710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.183.151.208
May  5 03:09:57 *** sshd[27710]: Failed password for invalid user web from 108.183.151.208 port 33110 ssh2
May  5 03:09:57 *** sshd[27710]: Received disconnect from 108.183.151.208 port 33110:11: Bye Bye [preauth]
May  5 03:09:57 *** sshd[27710]: Disconnected from 108.183.151.208 port 33110 [preauth]
May  5 03:14:04 *** sshd[27........
-------------------------------
2020-05-05 12:53:47
202.165.224.68 attackspambots
Wordpress malicious attack:[sshd]
2020-05-05 12:29:56
107.170.244.110 attack
2020-05-05T05:56:11.277124mail.broermann.family sshd[25007]: Failed password for invalid user teamspeak from 107.170.244.110 port 57040 ssh2
2020-05-05T05:58:06.798202mail.broermann.family sshd[25127]: Invalid user tn from 107.170.244.110 port 55404
2020-05-05T05:58:06.801428mail.broermann.family sshd[25127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.244.110
2020-05-05T05:58:06.798202mail.broermann.family sshd[25127]: Invalid user tn from 107.170.244.110 port 55404
2020-05-05T05:58:09.230465mail.broermann.family sshd[25127]: Failed password for invalid user tn from 107.170.244.110 port 55404 ssh2
...
2020-05-05 12:50:50
176.40.186.149 attackbotsspam
php WP PHPmyadamin ABUSE blocked for 12h
2020-05-05 12:14:59
159.89.171.121 attack
ssh brute force
2020-05-05 12:27:48
217.23.74.198 attackbotsspam
May  5 02:09:58 cdc sshd[14919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.23.74.198  user=pi
May  5 02:09:58 cdc sshd[14920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.23.74.198  user=pi
2020-05-05 12:17:28
106.12.120.19 attack
2020-05-05T02:16:06.982916homeassistant sshd[25552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.120.19  user=root
2020-05-05T02:16:09.243321homeassistant sshd[25552]: Failed password for root from 106.12.120.19 port 36602 ssh2
...
2020-05-05 12:17:05
58.210.204.122 attackspam
2020-05-0503:06:091jVm2C-0000aB-JR\<=info@whatsup2013.chH=\(localhost\)[113.172.161.237]:36878P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3163id=864bed9b90bb6e9dbe40b6e5ee3a032f0ce667b13a@whatsup2013.chT="Angelsearchingforwings."foralex0486@gmail.commicromaster83@gmail.com2020-05-0503:04:371jVm0i-0000RC-Uk\<=info@whatsup2013.chH=\(localhost\)[58.210.204.122]:41905P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3090id=27f4beede6cd18143376c09367a0aaa695f2520e@whatsup2013.chT="Icouldbeyourfriend"forjackson0694@gmail.comhankdougston@outlook.com2020-05-0503:05:061jVm18-0000UK-Bx\<=info@whatsup2013.chH=\(localhost\)[117.1.97.11]:38122P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3115id=a819affcf7dcf6fe6267d17d9a6e4458d46013@whatsup2013.chT="Desiretobeyourfriend"forjjjimmie7@gmail.combrianwalbeck@gmail.com2020-05-0503:05:491jVm1q-0000XG-Dc\<=info@whatsup2013.chH=\(localhost\)[1
2020-05-05 12:58:00
111.250.172.78 attack
Honeypot attack, port: 5555, PTR: 111-250-172-78.dynamic-ip.hinet.net.
2020-05-05 12:49:22

Recently Reported IPs

139.196.204.181 139.196.174.50 139.196.217.178 139.196.233.67
139.196.228.85 139.196.228.139 139.196.224.95 139.196.241.149
139.196.236.43 139.196.232.138 139.196.32.136 139.196.3.185
139.196.249.193 139.196.39.167 139.196.37.99 139.196.40.86
139.196.48.140 139.196.54.54 139.196.45.114 139.196.74.200