Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.201.39.27
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20693
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.201.39.27.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 03:52:07 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 27.39.201.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 27.39.201.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.248.129.181 attackbots
Invalid user admin from 14.248.129.181 port 58520
2019-08-23 23:12:43
50.239.140.1 attackbotsspam
Aug 23 16:42:42 eventyay sshd[23555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.239.140.1
Aug 23 16:42:44 eventyay sshd[23555]: Failed password for invalid user hammer from 50.239.140.1 port 54172 ssh2
Aug 23 16:46:59 eventyay sshd[24572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.239.140.1
...
2019-08-23 23:00:30
51.254.33.188 attack
Automatic report - Banned IP Access
2019-08-23 22:59:16
200.196.38.36 attack
Invalid user admin from 200.196.38.36 port 56175
2019-08-23 23:26:35
194.182.86.133 attack
Invalid user vnc from 194.182.86.133 port 45468
2019-08-23 23:32:58
178.127.109.118 attackbots
Invalid user admin from 178.127.109.118 port 44030
2019-08-23 23:41:10
195.214.223.84 attack
Invalid user www1 from 195.214.223.84 port 46914
2019-08-23 23:31:43
120.220.15.5 attackspam
Invalid user test from 120.220.15.5 port 2134
2019-08-24 00:02:22
123.28.243.96 attack
Invalid user admin from 123.28.243.96 port 40322
2019-08-23 23:59:40
122.248.38.28 attackspambots
Aug 23 22:38:21 lcl-usvr-02 sshd[28776]: Invalid user vbox from 122.248.38.28 port 39964
Aug 23 22:38:21 lcl-usvr-02 sshd[28776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.248.38.28
Aug 23 22:38:21 lcl-usvr-02 sshd[28776]: Invalid user vbox from 122.248.38.28 port 39964
Aug 23 22:38:23 lcl-usvr-02 sshd[28776]: Failed password for invalid user vbox from 122.248.38.28 port 39964 ssh2
Aug 23 22:44:45 lcl-usvr-02 sshd[30332]: Invalid user date from 122.248.38.28 port 40458
...
2019-08-24 00:00:55
191.7.8.180 attackspam
Invalid user train5 from 191.7.8.180 port 42000
2019-08-23 23:36:32
178.128.247.181 attack
Invalid user master from 178.128.247.181 port 49504
2019-08-23 23:40:09
59.25.197.162 attack
Invalid user ftpadmin from 59.25.197.162 port 46186
2019-08-23 22:56:43
124.205.101.146 attack
Invalid user jairo from 124.205.101.146 port 44936
2019-08-23 23:57:46
45.4.148.14 attack
Invalid user rechnerplatine from 45.4.148.14 port 45843
2019-08-23 23:05:04

Recently Reported IPs

193.238.133.51 103.138.75.168 43.134.206.139 183.93.99.93
187.136.214.80 129.226.28.243 186.4.128.37 167.58.131.161
165.22.14.77 69.21.54.39 91.21.230.132 115.56.4.46
88.229.71.186 78.110.66.87 61.2.47.48 79.127.83.39
120.86.253.112 118.212.100.45 27.158.92.1 115.239.222.41