Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: China Unicom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.208.192.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43454
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.208.192.166.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 02:52:40 CST 2025
;; MSG SIZE  rcvd: 108
Host info
166.192.208.139.in-addr.arpa domain name pointer 166.192.208.139.adsl-pool.jlccptt.net.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
166.192.208.139.in-addr.arpa	name = 166.192.208.139.adsl-pool.jlccptt.net.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.233.144.220 attack
Jul 24 15:46:58 nextcloud sshd\[20612\]: Invalid user dxp from 49.233.144.220
Jul 24 15:46:58 nextcloud sshd\[20612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.144.220
Jul 24 15:47:01 nextcloud sshd\[20612\]: Failed password for invalid user dxp from 49.233.144.220 port 50544 ssh2
2020-07-24 23:59:57
193.118.53.194 attackbotsspam
Firewall Dropped Connection
2020-07-25 00:16:12
103.10.223.222 attackspam
SMB Server BruteForce Attack
2020-07-25 00:20:30
116.198.162.65 attack
Jul 24 16:47:08 hosting sshd[13825]: Invalid user mark1 from 116.198.162.65 port 58582
...
2020-07-24 23:50:33
201.222.57.21 attackspambots
Jul 24 15:46:46 hell sshd[1334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.222.57.21
Jul 24 15:46:48 hell sshd[1334]: Failed password for invalid user transport from 201.222.57.21 port 48156 ssh2
...
2020-07-25 00:19:44
113.57.109.73 attackbots
Jul 24 16:22:32 abendstille sshd\[11280\]: Invalid user mine from 113.57.109.73
Jul 24 16:22:32 abendstille sshd\[11280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.57.109.73
Jul 24 16:22:34 abendstille sshd\[11280\]: Failed password for invalid user mine from 113.57.109.73 port 31220 ssh2
Jul 24 16:29:43 abendstille sshd\[19057\]: Invalid user cassandra from 113.57.109.73
Jul 24 16:29:43 abendstille sshd\[19057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.57.109.73
...
2020-07-25 00:30:16
193.109.79.191 attack
2020-07-24T10:34:51.2703781495-001 sshd[43824]: Invalid user kuro from 193.109.79.191 port 60040
2020-07-24T10:34:53.4681831495-001 sshd[43824]: Failed password for invalid user kuro from 193.109.79.191 port 60040 ssh2
2020-07-24T10:39:44.1165501495-001 sshd[44075]: Invalid user aastorp from 193.109.79.191 port 44946
2020-07-24T10:39:44.1215811495-001 sshd[44075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.109.79.191
2020-07-24T10:39:44.1165501495-001 sshd[44075]: Invalid user aastorp from 193.109.79.191 port 44946
2020-07-24T10:39:45.8697951495-001 sshd[44075]: Failed password for invalid user aastorp from 193.109.79.191 port 44946 ssh2
...
2020-07-25 00:00:21
178.128.217.135 attack
Failed password for invalid user git from 178.128.217.135 port 60282 ssh2
2020-07-25 00:27:55
175.145.232.73 attackspam
(sshd) Failed SSH login from 175.145.232.73 (MY/Malaysia/-): 5 in the last 3600 secs
2020-07-25 00:32:25
103.98.131.37 attackspambots
2020-07-24T15:41:51.546361mail.broermann.family sshd[31444]: Invalid user newsletter from 103.98.131.37 port 38748
2020-07-24T15:41:51.553476mail.broermann.family sshd[31444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.98.131.37
2020-07-24T15:41:51.546361mail.broermann.family sshd[31444]: Invalid user newsletter from 103.98.131.37 port 38748
2020-07-24T15:41:53.186652mail.broermann.family sshd[31444]: Failed password for invalid user newsletter from 103.98.131.37 port 38748 ssh2
2020-07-24T15:46:53.088936mail.broermann.family sshd[31706]: Invalid user jason from 103.98.131.37 port 50832
...
2020-07-25 00:16:34
218.92.0.185 attackspam
SSHD unauthorised connection attempt (b)
2020-07-25 00:21:47
45.84.196.113 attack
 TCP (SYN) 45.84.196.113:46296 -> port 80, len 44
2020-07-25 00:01:46
51.254.37.156 attackspam
Jul 24 17:49:42 ift sshd\[28345\]: Invalid user test from 51.254.37.156Jul 24 17:49:44 ift sshd\[28345\]: Failed password for invalid user test from 51.254.37.156 port 41384 ssh2Jul 24 17:53:04 ift sshd\[28911\]: Invalid user irina from 51.254.37.156Jul 24 17:53:06 ift sshd\[28911\]: Failed password for invalid user irina from 51.254.37.156 port 36702 ssh2Jul 24 17:56:29 ift sshd\[29564\]: Invalid user tereza from 51.254.37.156
...
2020-07-25 00:08:43
157.48.43.41 attackbotsspam
SMB Server BruteForce Attack
2020-07-25 00:24:42
198.27.80.123 attackspam
/wp-login.php
2020-07-24 23:55:45

Recently Reported IPs

64.223.79.139 75.222.30.97 81.58.250.181 27.148.26.235
245.78.69.38 197.239.244.78 173.134.114.145 2.96.10.141
202.215.214.54 14.206.205.249 235.20.157.39 243.73.80.23
172.73.57.146 131.248.194.172 235.38.72.172 126.132.53.201
205.68.48.183 91.44.15.189 6.199.205.213 248.255.21.130