Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.206.55.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63709
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.206.55.139.			IN	A

;; AUTHORITY SECTION:
.			363	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 14:37:06 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 139.55.206.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.55.206.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.89.102.190 attackspambots
2020-08-31 10:02:57.184806-0500  localhost smtpd[89098]: NOQUEUE: reject: RCPT from unknown[51.89.102.190]: 450 4.7.25 Client host rejected: cannot find your hostname, [51.89.102.190]; from= to= proto=ESMTP helo=
2020-09-01 00:57:55
147.253.217.244 attack
Used for spam
2020-09-01 00:38:17
198.100.148.96 attack
2020-08-31T14:54:54.053378vps1033 sshd[19992]: Invalid user cer from 198.100.148.96 port 34622
2020-08-31T14:54:54.062841vps1033 sshd[19992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns506154.ip-198-100-148.net
2020-08-31T14:54:54.053378vps1033 sshd[19992]: Invalid user cer from 198.100.148.96 port 34622
2020-08-31T14:54:56.253725vps1033 sshd[19992]: Failed password for invalid user cer from 198.100.148.96 port 34622 ssh2
2020-08-31T14:58:40.101145vps1033 sshd[28120]: Invalid user konica from 198.100.148.96 port 41062
...
2020-09-01 00:20:23
14.99.41.42 attackbotsspam
Unauthorized connection attempt from IP address 14.99.41.42 on Port 445(SMB)
2020-09-01 00:38:44
200.192.244.12 attack
Unauthorised access (Aug 31) SRC=200.192.244.12 LEN=52 TTL=117 ID=31306 DF TCP DPT=445 WINDOW=8192 SYN
2020-09-01 00:55:34
172.105.249.56 attack
[MonAug3114:33:34.5889062020][:error][pid24423:tid47243407456000][client172.105.249.56:46428][client172.105.249.56]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"python-requests/"atREQUEST_HEADERS:User-Agent.[file"/etc/apache2/conf.d/modsec_rules/20_asl_useragents.conf"][line"218"][id"332039"][rev"4"][msg"Atomicorp.comWAFRules:SuspiciousUnusualUserAgent\(python-requests\).Disablethisruleifyouusepython-requests/."][severity"CRITICAL"][hostname"81.17.25.249"][uri"/DbXmlInfo.xml"][unique_id"X0zuHgP2ul7LxEpvNSItAQAAAQo"][MonAug3114:33:55.6425032020][:error][pid24577:tid47243413759744][client172.105.249.56:33584][client172.105.249.56]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"python-requests/"atREQUEST_HEADERS:User-Agent.[file"/etc/apache2/conf.d/modsec_rules/20_asl_useragents.conf"][line"218"][id"332039"][rev"4"][msg"Atomicorp.comWAFRules:SuspiciousUnusualUserAgent\(python-requests\).Disablethisruleifyouusepython-requests/."][severity"CRITICAL"][hostna
2020-09-01 00:15:49
113.31.104.89 attackbots
Aug 31 14:33:11 nehost postfix/smtpd[1780]: warning: unknown[113.31.104.89]: SASL LOGIN authentication failed: authentication failure
Aug 31 14:33:14 nehost postfix/smtpd[1780]: warning: unknown[113.31.104.89]: SASL LOGIN authentication failed: authentication failure
Aug 31 14:33:15 nehost postfix/smtpd[1780]: warning: unknown[113.31.104.89]: SASL LOGIN authentication failed: authentication failure
2020-09-01 00:41:58
139.59.57.39 attackbotsspam
Brute-force attempt banned
2020-09-01 00:43:09
195.158.31.58 attack
Script, SQL, query string injections
2020-09-01 00:23:02
174.138.48.152 attackspam
Bruteforce detected by fail2ban
2020-09-01 00:42:47
47.30.201.173 attackspam
Unauthorized connection attempt from IP address 47.30.201.173 on Port 445(SMB)
2020-09-01 00:31:54
51.77.220.127 attack
51.77.220.127 - - [31/Aug/2020:19:58:36 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2"
...
2020-09-01 00:35:21
176.59.50.176 attackspambots
Unauthorized connection attempt from IP address 176.59.50.176 on Port 445(SMB)
2020-09-01 00:26:42
222.186.42.137 attackspambots
Aug 31 18:59:37 eventyay sshd[26383]: Failed password for root from 222.186.42.137 port 62736 ssh2
Aug 31 18:59:39 eventyay sshd[26383]: Failed password for root from 222.186.42.137 port 62736 ssh2
Aug 31 18:59:41 eventyay sshd[26383]: Failed password for root from 222.186.42.137 port 62736 ssh2
...
2020-09-01 01:03:30
103.131.71.178 attack
(mod_security) mod_security (id:210730) triggered by 103.131.71.178 (VN/Vietnam/bot-103-131-71-178.coccoc.com): 5 in the last 3600 secs
2020-09-01 00:40:16

Recently Reported IPs

139.205.233.138 139.206.55.242 139.209.174.186 139.208.226.78
139.209.127.19 139.209.68.231 139.210.164.10 139.212.112.163
139.210.68.242 139.214.160.56 139.210.155.122 139.213.106.226
139.209.197.170 139.212.133.138 139.214.8.95 139.213.210.93
139.224.40.216 139.224.134.64 139.214.71.0 139.224.246.185