Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: Beijing

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.197.101.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16788
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.197.101.214.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061300 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jun 13 21:58:35 CST 2019
;; MSG SIZE  rcvd: 119

Host info
Host 214.101.197.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 214.101.197.139.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
46.26.56.253 attackbots
Repeated RDP login failures. Last user: Administracion
2020-09-17 15:38:27
178.128.221.85 attack
Invalid user Usuario from 178.128.221.85 port 42762
2020-09-17 15:30:10
203.177.85.38 attackbots
Unauthorized connection attempt from IP address 203.177.85.38 on Port 445(SMB)
2020-09-17 15:14:15
37.193.123.110 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-09-17 15:40:22
45.141.84.141 attackbots
RDP Bruteforce
2020-09-17 15:38:59
212.55.214.194 attackspam
RDP Bruteforce
2020-09-17 15:24:51
186.155.12.138 attackspam
DATE:2020-09-16 18:58:35, IP:186.155.12.138, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-09-17 15:11:38
24.178.76.242 attackspam
Honeypot attack, port: 81, PTR: 024-178-076-242.res.spectrum.com.
2020-09-17 15:10:48
202.83.44.89 attack
GPON Home Routers Remote Code Execution Vulnerability
2020-09-17 15:03:20
211.103.135.104 attack
RDPBrutePap24
2020-09-17 15:25:17
162.247.74.217 attack
SSH Brute-Forcing (server1)
2020-09-17 15:30:26
209.126.151.122 attackbotsspam
port scan and connect, tcp 80 (http)
2020-09-17 15:11:13
41.228.165.153 attack
RDP Bruteforce
2020-09-17 15:39:20
134.175.100.217 attackspam
Port probing on unauthorized port 3389
2020-09-17 15:31:33
152.67.12.90 attackspambots
Sep 17 04:02:28 Invalid user server from 152.67.12.90 port 43752
2020-09-17 15:31:14

Recently Reported IPs

218.207.45.149 51.5.172.232 178.153.33.3 60.23.105.62
177.188.154.54 209.14.221.51 108.79.122.183 111.63.135.109
191.206.195.87 178.151.69.163 194.187.123.171 220.132.102.142
118.24.11.159 124.20.170.155 178.151.69.133 220.148.46.30
178.150.162.171 127.79.74.140 18.62.93.75 118.89.57.149