Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.206.204.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8205
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.206.204.169.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 16:24:24 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 169.204.206.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 169.204.206.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.250.30.122 attack
port scan and connect, tcp 23 (telnet)
2020-04-24 18:45:46
178.32.35.79 attackbots
Invalid user pd from 178.32.35.79 port 51458
2020-04-24 18:49:50
47.148.172.82 attack
SSH login attempts.
2020-04-24 18:39:46
195.62.32.45 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-04-24 18:46:20
46.101.151.52 attackbotsspam
Apr 24 12:16:40 OPSO sshd\[1760\]: Invalid user git from 46.101.151.52 port 42768
Apr 24 12:16:40 OPSO sshd\[1760\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.151.52
Apr 24 12:16:42 OPSO sshd\[1760\]: Failed password for invalid user git from 46.101.151.52 port 42768 ssh2
Apr 24 12:21:54 OPSO sshd\[4036\]: Invalid user dellin from 46.101.151.52 port 55916
Apr 24 12:21:54 OPSO sshd\[4036\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.151.52
2020-04-24 18:40:08
79.137.2.105 attackspam
Invalid user server from 79.137.2.105 port 41921
2020-04-24 18:39:22
194.180.224.139 attackbotsspam
port 23
2020-04-24 19:03:47
103.4.217.96 attack
Invalid user gj from 103.4.217.96 port 35106
2020-04-24 18:56:40
123.207.249.145 attack
Invalid user hadoop from 123.207.249.145 port 35884
2020-04-24 18:31:54
165.227.85.62 attackbots
Invalid user admin from 165.227.85.62 port 48784
2020-04-24 19:09:07
49.235.120.41 attackspambots
MYH,DEF HEAD /admin.php?c=login
2020-04-24 18:50:17
206.81.12.209 attackbots
Invalid user yw from 206.81.12.209 port 38626
2020-04-24 19:06:37
125.124.91.247 attack
Invalid user guoq from 125.124.91.247 port 46866
2020-04-24 18:54:42
115.75.103.245 attackbotsspam
DATE:2020-04-24 08:42:01, IP:115.75.103.245, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc)
2020-04-24 18:42:22
27.115.15.8 attack
(sshd) Failed SSH login from 27.115.15.8 (CN/China/-): 5 in the last 3600 secs
2020-04-24 18:57:14

Recently Reported IPs

177.98.25.157 88.13.214.53 178.189.242.225 59.251.15.99
212.25.87.91 69.23.21.155 252.223.119.135 78.6.221.33
20.250.33.82 227.95.241.46 87.113.181.192 131.245.66.201
75.133.13.177 210.169.207.202 53.23.10.68 46.187.128.139
204.198.36.241 204.95.122.10 54.69.173.150 60.175.224.16