Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.200.143.203
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34163
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.200.143.203.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 20:01:06 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 203.143.200.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 203.143.200.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
122.14.216.49 attackspambots
Dec  9 00:26:50 game-panel sshd[24856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.14.216.49
Dec  9 00:26:52 game-panel sshd[24856]: Failed password for invalid user claudell from 122.14.216.49 port 63099 ssh2
Dec  9 00:34:06 game-panel sshd[25309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.14.216.49
2019-12-09 08:35:01
51.89.50.233 attack
Dec  9 01:01:06 ns381471 sshd[6399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.50.233
Dec  9 01:01:08 ns381471 sshd[6399]: Failed password for invalid user kensinger from 51.89.50.233 port 56115 ssh2
2019-12-09 08:08:06
181.129.161.28 attackspam
Dec  9 01:37:24 sso sshd[20863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.129.161.28
Dec  9 01:37:26 sso sshd[20863]: Failed password for invalid user anthropo from 181.129.161.28 port 41474 ssh2
...
2019-12-09 08:38:47
112.85.42.176 attackbotsspam
Dec  9 01:12:17 ovpn sshd\[2262\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176  user=root
Dec  9 01:12:19 ovpn sshd\[2262\]: Failed password for root from 112.85.42.176 port 53738 ssh2
Dec  9 01:12:36 ovpn sshd\[2337\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176  user=root
Dec  9 01:12:38 ovpn sshd\[2337\]: Failed password for root from 112.85.42.176 port 27998 ssh2
Dec  9 01:12:51 ovpn sshd\[2337\]: Failed password for root from 112.85.42.176 port 27998 ssh2
2019-12-09 08:21:14
185.140.132.19 attackspam
[portscan] Port scan
2019-12-09 08:01:41
85.192.72.128 attackbots
Dec  9 00:58:52 vps647732 sshd[23448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.192.72.128
Dec  9 00:58:54 vps647732 sshd[23448]: Failed password for invalid user tufford from 85.192.72.128 port 50838 ssh2
...
2019-12-09 08:09:28
62.234.122.141 attackspam
Dec  9 01:12:43 srv206 sshd[22526]: Invalid user postgres from 62.234.122.141
...
2019-12-09 08:29:17
122.199.152.157 attackbots
Dec  8 19:12:53 plusreed sshd[29468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.199.152.157  user=root
Dec  8 19:12:55 plusreed sshd[29468]: Failed password for root from 122.199.152.157 port 39235 ssh2
...
2019-12-09 08:18:55
222.186.175.148 attackspambots
Brute-force attempt banned
2019-12-09 08:25:25
80.245.26.205 attackbots
Dec  9 05:22:51 gw1 sshd[5959]: Failed password for root from 80.245.26.205 port 48304 ssh2
Dec  9 05:27:58 gw1 sshd[6278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.245.26.205
...
2019-12-09 08:31:02
152.249.245.68 attackbotsspam
Dec  9 01:12:41 ns381471 sshd[7271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.249.245.68
Dec  9 01:12:43 ns381471 sshd[7271]: Failed password for invalid user turnidge from 152.249.245.68 port 37274 ssh2
2019-12-09 08:29:04
69.181.180.81 attackspam
2019-12-09T00:12:59.080998abusebot.cloudsearch.cf sshd\[3815\]: Invalid user wl from 69.181.180.81 port 44066
2019-12-09T00:12:59.086699abusebot.cloudsearch.cf sshd\[3815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-69-181-180-81.hsd1.ca.comcast.net
2019-12-09 08:15:02
5.23.44.246 attack
Dec  8 13:53:22 web1 sshd\[8484\]: Invalid user guest from 5.23.44.246
Dec  8 13:53:22 web1 sshd\[8484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.23.44.246
Dec  8 13:53:24 web1 sshd\[8484\]: Failed password for invalid user guest from 5.23.44.246 port 33689 ssh2
Dec  8 13:59:24 web1 sshd\[9173\]: Invalid user test from 5.23.44.246
Dec  8 13:59:24 web1 sshd\[9173\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.23.44.246
2019-12-09 07:59:31
139.59.46.243 attackspam
Dec  8 14:06:52 php1 sshd\[21443\]: Invalid user donghoon from 139.59.46.243
Dec  8 14:06:52 php1 sshd\[21443\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.46.243
Dec  8 14:06:54 php1 sshd\[21443\]: Failed password for invalid user donghoon from 139.59.46.243 port 47326 ssh2
Dec  8 14:12:53 php1 sshd\[22308\]: Invalid user databases from 139.59.46.243
Dec  8 14:12:53 php1 sshd\[22308\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.46.243
2019-12-09 08:20:45
103.219.76.2 attackbotsspam
Dec  8 23:53:01 game-panel sshd[22804]: Failed password for root from 103.219.76.2 port 57956 ssh2
Dec  8 23:59:47 game-panel sshd[23195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.219.76.2
Dec  8 23:59:49 game-panel sshd[23195]: Failed password for invalid user gin_par from 103.219.76.2 port 37520 ssh2
2019-12-09 08:05:10

Recently Reported IPs

218.203.38.112 18.153.160.156 226.81.139.183 229.100.207.230
161.202.74.107 166.90.180.213 229.199.171.4 242.152.24.26
57.57.124.82 169.33.227.35 71.87.50.250 86.123.249.26
92.205.172.81 109.136.247.14 241.162.84.233 44.114.167.87
154.21.142.231 145.179.178.188 151.75.191.11 161.105.7.14