Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: China Telecom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.200.64.156
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38289
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.200.64.156.			IN	A

;; AUTHORITY SECTION:
.			319	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023040101 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 02 02:10:12 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 156.64.200.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 156.64.200.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
203.106.194.124 attackbots
2020-05-12T03:18:23.495228mail.cevreciler.com sshd[28059]: Invalid user lzj from 203.106.194.124 port 53008
2020-05-12T03:18:23.499457mail.cevreciler.com sshd[28059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=sp-194-124.tm.net.my
2020-05-12T03:18:24.987081mail.cevreciler.com sshd[28059]: Failed password for invalid user lzj from 203.106.194.124 port 53008 ssh2
2020-05-12T03:22:48.111361mail.cevreciler.com sshd[28145]: Invalid user blond from 203.106.194.124 port 58474
2020-05-12T03:22:48.116717mail.cevreciler.com sshd[28145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=sp-194-124.tm.net.my

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=203.106.194.124
2020-05-14 21:51:00
209.141.40.12 attackbots
2020-05-14T12:43:57.906586shield sshd\[8256\]: Invalid user www from 209.141.40.12 port 59790
2020-05-14T12:43:57.907137shield sshd\[8243\]: Invalid user tomcat from 209.141.40.12 port 59824
2020-05-14T12:43:57.907646shield sshd\[8255\]: Invalid user postgres from 209.141.40.12 port 59798
2020-05-14T12:43:57.908102shield sshd\[8242\]: Invalid user hadoop from 209.141.40.12 port 59816
2020-05-14T12:43:57.908535shield sshd\[8244\]: Invalid user admin from 209.141.40.12 port 59786
2020-05-14T12:43:57.909229shield sshd\[8241\]: Invalid user oracle from 209.141.40.12 port 59808
2020-05-14 21:27:09
202.100.51.1 attackbotsspam
May 14 14:17:09 ns382633 sshd\[17543\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.100.51.1  user=root
May 14 14:17:12 ns382633 sshd\[17543\]: Failed password for root from 202.100.51.1 port 3391 ssh2
May 14 14:28:21 ns382633 sshd\[19545\]: Invalid user user from 202.100.51.1 port 4971
May 14 14:28:21 ns382633 sshd\[19545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.100.51.1
May 14 14:28:23 ns382633 sshd\[19545\]: Failed password for invalid user user from 202.100.51.1 port 4971 ssh2
2020-05-14 21:21:52
27.128.187.131 attackspambots
May 14 09:10:13 NPSTNNYC01T sshd[15815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.187.131
May 14 09:10:15 NPSTNNYC01T sshd[15815]: Failed password for invalid user deploy from 27.128.187.131 port 32932 ssh2
May 14 09:15:09 NPSTNNYC01T sshd[17644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.187.131
...
2020-05-14 21:21:07
137.220.138.252 attackspambots
May 14 13:08:02 localhost sshd[118443]: Invalid user rob from 137.220.138.252 port 56004
May 14 13:08:02 localhost sshd[118443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.220.138.252
May 14 13:08:02 localhost sshd[118443]: Invalid user rob from 137.220.138.252 port 56004
May 14 13:08:04 localhost sshd[118443]: Failed password for invalid user rob from 137.220.138.252 port 56004 ssh2
May 14 13:15:49 localhost sshd[119290]: Invalid user ceph from 137.220.138.252 port 37680
...
2020-05-14 21:28:21
168.61.176.121 attackspam
Found by fail2ban
2020-05-14 21:54:57
106.54.83.45 attack
2020-05-14T06:28:11.875513linuxbox-skyline sshd[164965]: Invalid user tacpro from 106.54.83.45 port 54512
...
2020-05-14 21:26:47
83.118.194.4 attackbotsspam
k+ssh-bruteforce
2020-05-14 21:26:33
200.61.208.215 attackbotsspam
Rude login attack (2 tries in 1d)
2020-05-14 21:24:15
106.12.207.197 attackbots
May 14 18:10:23 gw1 sshd[22172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.207.197
May 14 18:10:25 gw1 sshd[22172]: Failed password for invalid user brady from 106.12.207.197 port 44914 ssh2
...
2020-05-14 21:38:12
116.255.139.236 attackbotsspam
May 14 15:40:56 OPSO sshd\[25634\]: Invalid user sinus1 from 116.255.139.236 port 34256
May 14 15:40:56 OPSO sshd\[25634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.255.139.236
May 14 15:40:58 OPSO sshd\[25634\]: Failed password for invalid user sinus1 from 116.255.139.236 port 34256 ssh2
May 14 15:44:22 OPSO sshd\[26372\]: Invalid user user from 116.255.139.236 port 46744
May 14 15:44:22 OPSO sshd\[26372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.255.139.236
2020-05-14 21:53:40
186.146.1.122 attackbotsspam
(sshd) Failed SSH login from 186.146.1.122 (CO/Colombia/static-ip-1861461122.cable.net.co): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 14 15:00:09 amsweb01 sshd[7854]: Invalid user postgres from 186.146.1.122 port 49914
May 14 15:00:11 amsweb01 sshd[7854]: Failed password for invalid user postgres from 186.146.1.122 port 49914 ssh2
May 14 15:10:37 amsweb01 sshd[8903]: Invalid user zm from 186.146.1.122 port 38546
May 14 15:10:38 amsweb01 sshd[8903]: Failed password for invalid user zm from 186.146.1.122 port 38546 ssh2
May 14 15:15:00 amsweb01 sshd[9411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.146.1.122  user=root
2020-05-14 21:27:29
37.49.226.130 attack
firewall-block, port(s): 81/tcp
2020-05-14 21:37:24
106.12.138.226 attackbotsspam
May 14 22:15:47 web1 sshd[9358]: Invalid user jones from 106.12.138.226 port 37184
May 14 22:15:47 web1 sshd[9358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.138.226
May 14 22:15:47 web1 sshd[9358]: Invalid user jones from 106.12.138.226 port 37184
May 14 22:15:49 web1 sshd[9358]: Failed password for invalid user jones from 106.12.138.226 port 37184 ssh2
May 14 22:24:56 web1 sshd[11470]: Invalid user git from 106.12.138.226 port 50732
May 14 22:24:56 web1 sshd[11470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.138.226
May 14 22:24:56 web1 sshd[11470]: Invalid user git from 106.12.138.226 port 50732
May 14 22:24:58 web1 sshd[11470]: Failed password for invalid user git from 106.12.138.226 port 50732 ssh2
May 14 22:28:28 web1 sshd[12361]: Invalid user postgres from 106.12.138.226 port 36916
...
2020-05-14 21:17:16
175.24.36.114 attackbots
May 14 15:29:15 sip sshd[257678]: Invalid user min from 175.24.36.114 port 42674
May 14 15:29:18 sip sshd[257678]: Failed password for invalid user min from 175.24.36.114 port 42674 ssh2
May 14 15:32:41 sip sshd[257693]: Invalid user testftp from 175.24.36.114 port 51920
...
2020-05-14 21:53:16

Recently Reported IPs

113.24.225.14 45.17.37.123 195.180.225.203 85.112.249.204
113.24.225.146 85.154.197.121 235.240.211.167 234.247.112.76
173.34.178.228 113.24.225.114 248.132.165.103 98.126.140.137
41.88.25.79 0.236.158.246 211.205.159.107 104.235.155.151
38.180.34.201 175.94.108.132 80.64.161.83 30.163.31.156