Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
139.198.13.178 attackspambots
Mar 18 02:15:41 s158375 sshd[22681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.13.178
2020-03-18 18:35:26
139.198.13.178 attackbotsspam
Mar  8 15:57:45 vps691689 sshd[9262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.13.178
Mar  8 15:57:48 vps691689 sshd[9262]: Failed password for invalid user ark from 139.198.13.178 port 58164 ssh2
...
2020-03-08 23:05:30
139.198.13.178 attackbotsspam
Feb 21 12:10:01 MainVPS sshd[3030]: Invalid user liuzhenfeng from 139.198.13.178 port 38040
Feb 21 12:10:01 MainVPS sshd[3030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.13.178
Feb 21 12:10:01 MainVPS sshd[3030]: Invalid user liuzhenfeng from 139.198.13.178 port 38040
Feb 21 12:10:03 MainVPS sshd[3030]: Failed password for invalid user liuzhenfeng from 139.198.13.178 port 38040 ssh2
Feb 21 12:11:55 MainVPS sshd[6862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.13.178  user=proxy
Feb 21 12:11:57 MainVPS sshd[6862]: Failed password for proxy from 139.198.13.178 port 50864 ssh2
...
2020-02-21 19:46:02
139.198.13.178 attackbots
Feb 16 05:59:29 MK-Soft-VM8 sshd[16762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.13.178 
Feb 16 05:59:32 MK-Soft-VM8 sshd[16762]: Failed password for invalid user events from 139.198.13.178 port 40468 ssh2
...
2020-02-16 13:14:34
139.198.13.178 attackspam
Automatic report - SSH Brute-Force Attack
2020-02-15 17:57:38
139.198.13.178 attackspambots
Unauthorized connection attempt detected from IP address 139.198.13.178 to port 2220 [J]
2020-01-23 09:21:10
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.198.13.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45645
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.198.13.49.			IN	A

;; AUTHORITY SECTION:
.			154	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020601 1800 900 604800 86400

;; Query time: 89 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 12:35:42 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 49.13.198.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 49.13.198.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
190.210.231.34 attackbotsspam
Jul 23 14:32:12 serwer sshd\[21762\]: Invalid user daniel from 190.210.231.34 port 42462
Jul 23 14:32:12 serwer sshd\[21762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.210.231.34
Jul 23 14:32:14 serwer sshd\[21762\]: Failed password for invalid user daniel from 190.210.231.34 port 42462 ssh2
...
2020-07-24 02:30:21
106.75.218.71 attack
Invalid user chenxuwu from 106.75.218.71 port 56868
2020-07-24 02:36:38
43.226.147.239 attackbots
Unauthorised connection attempt detected at AUO FR1 NODE2. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-07-24 02:10:35
202.21.123.185 attackspambots
Invalid user backup from 202.21.123.185 port 52896
2020-07-24 02:29:38
111.93.200.50 attack
Jul 23 15:58:56 vlre-nyc-1 sshd\[1817\]: Invalid user ftpuser from 111.93.200.50
Jul 23 15:58:56 vlre-nyc-1 sshd\[1817\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.200.50
Jul 23 15:58:58 vlre-nyc-1 sshd\[1817\]: Failed password for invalid user ftpuser from 111.93.200.50 port 45570 ssh2
Jul 23 16:07:12 vlre-nyc-1 sshd\[2003\]: Invalid user jmb from 111.93.200.50
Jul 23 16:07:12 vlre-nyc-1 sshd\[2003\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.200.50
...
2020-07-24 02:35:44
80.98.249.181 attackbots
2020-07-23T18:54:39.083326mail.broermann.family sshd[15173]: Invalid user avr from 80.98.249.181 port 34620
2020-07-23T18:54:39.089551mail.broermann.family sshd[15173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=catv-80-98-249-181.catv.broadband.hu
2020-07-23T18:54:39.083326mail.broermann.family sshd[15173]: Invalid user avr from 80.98.249.181 port 34620
2020-07-23T18:54:40.927603mail.broermann.family sshd[15173]: Failed password for invalid user avr from 80.98.249.181 port 34620 ssh2
2020-07-23T18:57:31.884588mail.broermann.family sshd[15266]: Invalid user gene from 80.98.249.181 port 34540
...
2020-07-24 02:23:36
140.143.243.27 attack
Jul 23 18:36:52 icinga sshd[63448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.243.27 
Jul 23 18:36:54 icinga sshd[63448]: Failed password for invalid user mmm from 140.143.243.27 port 57284 ssh2
Jul 23 18:49:56 icinga sshd[22372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.243.27 
...
2020-07-24 02:20:37
157.230.31.236 attackbots
Jul 23 18:10:28 onepixel sshd[4047919]: Invalid user dmr from 157.230.31.236 port 53414
Jul 23 18:10:28 onepixel sshd[4047919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.31.236 
Jul 23 18:10:28 onepixel sshd[4047919]: Invalid user dmr from 157.230.31.236 port 53414
Jul 23 18:10:30 onepixel sshd[4047919]: Failed password for invalid user dmr from 157.230.31.236 port 53414 ssh2
Jul 23 18:14:15 onepixel sshd[4049894]: Invalid user jagan from 157.230.31.236 port 37980
2020-07-24 02:18:45
191.8.187.245 attackspam
Invalid user sachin from 191.8.187.245 port 35300
2020-07-24 02:15:22
140.238.25.151 attackbotsspam
Jul 23 17:40:41 vpn01 sshd[13953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.238.25.151
Jul 23 17:40:43 vpn01 sshd[13953]: Failed password for invalid user test from 140.238.25.151 port 52618 ssh2
...
2020-07-24 02:20:11
109.203.192.125 attack
Jul 23 18:33:48 scw-focused-cartwright sshd[1253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.203.192.125
Jul 23 18:33:51 scw-focused-cartwright sshd[1253]: Failed password for invalid user kuehne from 109.203.192.125 port 54927 ssh2
2020-07-24 02:36:14
154.221.31.153 attack
Jul 23 20:17:35 jane sshd[4721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.221.31.153 
Jul 23 20:17:36 jane sshd[4721]: Failed password for invalid user abcd from 154.221.31.153 port 48720 ssh2
...
2020-07-24 02:19:06
210.42.37.150 attackbots
Invalid user scanner from 210.42.37.150 port 44680
2020-07-24 02:12:42
122.55.190.12 attackbots
2020-07-23T18:58:58.286861+02:00  sshd[1043]: Failed password for invalid user test from 122.55.190.12 port 42273 ssh2
2020-07-24 02:21:18
202.38.153.233 attackbots
SSH Brute Force
2020-07-24 02:46:22

Recently Reported IPs

42.127.34.114 45.128.207.52 121.181.246.11 87.250.224.156
176.197.211.20 124.223.35.64 67.85.34.179 116.68.198.198
115.86.31.48 45.153.242.112 147.78.66.153 188.226.248.112
36.69.95.182 223.149.7.113 119.155.30.119 103.102.15.182
27.198.241.211 208.107.36.47 1.52.36.178 121.11.243.207