Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
139.200.49.54 attackspambots
Unauthorized connection attempt detected from IP address 139.200.49.54 to port 23 [T]
2020-01-09 02:13:28
139.200.49.54 attackbots
firewall-block, port(s): 23/tcp
2020-01-07 22:17:04
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.200.49.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29130
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.200.49.124.			IN	A

;; AUTHORITY SECTION:
.			321	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 17:36:23 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 124.49.200.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 124.49.200.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
192.144.172.50 attack
Jun  5 08:42:44 journals sshd\[21424\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.172.50  user=root
Jun  5 08:42:46 journals sshd\[21424\]: Failed password for root from 192.144.172.50 port 34238 ssh2
Jun  5 08:47:19 journals sshd\[21923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.172.50  user=root
Jun  5 08:47:21 journals sshd\[21923\]: Failed password for root from 192.144.172.50 port 57994 ssh2
Jun  5 08:51:57 journals sshd\[22484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.172.50  user=root
...
2020-06-05 15:42:43
46.101.40.21 attack
Jun  5 07:58:37 abendstille sshd\[29498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.40.21  user=root
Jun  5 07:58:40 abendstille sshd\[29498\]: Failed password for root from 46.101.40.21 port 36884 ssh2
Jun  5 08:02:11 abendstille sshd\[32765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.40.21  user=root
Jun  5 08:02:13 abendstille sshd\[32765\]: Failed password for root from 46.101.40.21 port 41510 ssh2
Jun  5 08:05:38 abendstille sshd\[3534\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.40.21  user=root
...
2020-06-05 16:11:38
106.52.84.117 attack
(sshd) Failed SSH login from 106.52.84.117 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun  5 06:40:07 srv sshd[27025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.84.117  user=root
Jun  5 06:40:09 srv sshd[27025]: Failed password for root from 106.52.84.117 port 49514 ssh2
Jun  5 06:50:18 srv sshd[27301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.84.117  user=root
Jun  5 06:50:20 srv sshd[27301]: Failed password for root from 106.52.84.117 port 60000 ssh2
Jun  5 06:53:38 srv sshd[27419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.84.117  user=root
2020-06-05 16:12:08
51.158.190.54 attackbotsspam
Jun  5 05:02:24 firewall sshd[28989]: Failed password for root from 51.158.190.54 port 32882 ssh2
Jun  5 05:05:43 firewall sshd[29083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.190.54  user=root
Jun  5 05:05:45 firewall sshd[29083]: Failed password for root from 51.158.190.54 port 36204 ssh2
...
2020-06-05 16:13:54
46.175.21.30 attackspam
[ssh] SSH attack
2020-06-05 16:05:56
45.133.9.4 attackbotsspam
IP blocked
2020-06-05 16:20:53
31.170.51.83 attack
(IR/Iran/-) SMTP Bruteforcing attempts
2020-06-05 15:53:13
122.116.206.211 attackbots
 TCP (SYN) 122.116.206.211:51640 -> port 8000, len 44
2020-06-05 16:14:22
31.170.53.175 attackbots
(IR/Iran/-) SMTP Bruteforcing attempts
2020-06-05 15:50:46
110.29.237.190 attackspam
Jun  5 06:53:27 debian kernel: [231769.703900] [UFW BLOCK] IN=eth0 OUT= MAC=52:54:00:be:e4:65:08:e8:4f:6e:48:0c:08:00 SRC=110.29.237.190 DST=89.252.131.35 LEN=40 TOS=0x00 PREC=0x00 TTL=44 ID=34266 PROTO=TCP SPT=37528 DPT=5555 WINDOW=26480 RES=0x00 SYN URGP=0
2020-06-05 16:24:29
148.251.41.239 attack
Multiple web server 500 error code (Internal Error).
2020-06-05 16:16:18
149.56.99.85 attack
2020-06-05T08:44[Censored Hostname] sshd[2725389]: Failed password for sshd from 149.56.99.85 port 41408 ssh2
2020-06-05T08:44[Censored Hostname] sshd[2725389]: Failed password for sshd from 149.56.99.85 port 41408 ssh2
2020-06-05T08:44[Censored Hostname] sshd[2725389]: Failed password for sshd from 149.56.99.85 port 41408 ssh2[...]
2020-06-05 16:01:54
14.116.195.245 attackbotsspam
Jun  4 21:48:20 server1 sshd\[578\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.116.195.245  user=root
Jun  4 21:48:22 server1 sshd\[578\]: Failed password for root from 14.116.195.245 port 43292 ssh2
Jun  4 21:50:52 server1 sshd\[1262\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.116.195.245  user=root
Jun  4 21:50:54 server1 sshd\[1262\]: Failed password for root from 14.116.195.245 port 52098 ssh2
Jun  4 21:53:28 server1 sshd\[1924\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.116.195.245  user=root
...
2020-06-05 16:21:24
109.94.50.248 attackbots
Jun  5 05:54:27 nextcloud sshd\[11213\]: Invalid user admin from 109.94.50.248
Jun  5 05:54:27 nextcloud sshd\[11213\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.94.50.248
Jun  5 05:54:29 nextcloud sshd\[11213\]: Failed password for invalid user admin from 109.94.50.248 port 37490 ssh2
2020-06-05 15:44:38
37.120.203.72 attack
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2020-06-05 15:40:51

Recently Reported IPs

139.201.186.248 139.203.135.145 139.205.162.207 139.204.165.192
139.202.28.110 139.205.18.246 139.205.200.12 139.205.188.91
139.205.229.230 139.205.233.110 139.205.238.211 139.205.228.23
139.205.70.181 139.206.53.212 139.206.26.58 139.206.53.188
139.214.254.175 139.208.115.30 139.226.172.90 206.52.46.78