Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
139.209.233.233 attack
Unauthorised access (Jul 23) SRC=139.209.233.233 LEN=40 TTL=46 ID=50727 TCP DPT=8080 WINDOW=57233 SYN 
Unauthorised access (Jul 23) SRC=139.209.233.233 LEN=40 TTL=46 ID=29948 TCP DPT=8080 WINDOW=57233 SYN
2020-07-23 12:15:15
139.209.200.210 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-02-28 02:35:17
139.209.200.210 attackbots
Jan 12 05:55:54 debian-2gb-nbg1-2 kernel: \[1064261.016933\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=139.209.200.210 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=39 ID=45689 PROTO=TCP SPT=52311 DPT=23 WINDOW=3592 RES=0x00 SYN URGP=0
2020-01-12 17:18:18
139.209.241.162 attackspam
Splunk® : Brute-Force login attempt on SSH:
Aug 25 14:52:19 testbed sshd[24041]: Failed password for invalid user admin from 139.209.241.162 port 37618 ssh2
2019-08-26 03:47:08
139.209.218.164 attackspambots
23/tcp
[2019-07-19]1pkt
2019-07-20 04:52:14
139.209.225.213 attackspam
Telnet Server BruteForce Attack
2019-07-16 05:57:21
139.209.25.98 attackspam
firewall-block, port(s): 23/tcp
2019-06-23 18:47:04
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.209.2.204
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46329
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.209.2.204.			IN	A

;; AUTHORITY SECTION:
.			475	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010200 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 02 20:13:17 CST 2022
;; MSG SIZE  rcvd: 106
Host info
204.2.209.139.in-addr.arpa domain name pointer 204.2.209.139.adsl-pool.jlccptt.net.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
204.2.209.139.in-addr.arpa	name = 204.2.209.139.adsl-pool.jlccptt.net.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
158.69.217.202 attackbotsspam
IP: 158.69.217.202
ASN: AS16276 OVH SAS
Port: http protocol over TLS/SSL 443
Found in one or more Blacklists
Date: 26/06/2019 2:09:01 AM UTC
2019-06-26 11:47:30
71.6.146.186 attackspam
Portscan or hack attempt detected by psad/fwsnort
2019-06-26 12:13:15
178.62.75.81 attackbotsspam
Scanning and Vuln Attempts
2019-06-26 12:18:30
114.230.104.12 attack
2019-06-26T04:08:23.177108mail01 postfix/smtpd[8646]: warning: unknown[114.230.104.12]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-26T04:08:31.082111mail01 postfix/smtpd[10306]: warning: unknown[114.230.104.12]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-26T04:09:02.076081mail01 postfix/smtpd[29331]: warning: unknown[114.230.104.12]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-26 11:46:39
58.247.126.150 attackbots
3389BruteforceFW21
2019-06-26 12:24:17
184.105.69.21 attack
Scanning and Vuln Attempts
2019-06-26 12:09:30
178.32.219.209 attackbotsspam
$f2bV_matches
2019-06-26 11:38:08
186.224.167.233 attackspam
libpam_shield report: forced login attempt
2019-06-26 11:45:35
178.62.63.148 attack
Scanning and Vuln Attempts
2019-06-26 12:22:16
42.112.83.131 attackspam
TCP port 445 (SMB) attempt blocked by firewall. [2019-06-26 04:07:59]
2019-06-26 11:54:03
159.203.61.149 attackbotsspam
IP: 159.203.61.149
ASN: AS14061 DigitalOcean LLC
Port: http protocol over TLS/SSL 443
Found in one or more Blacklists
Date: 26/06/2019 2:09:04 AM UTC
2019-06-26 11:45:10
154.125.195.192 attackbots
IP: 154.125.195.192
ASN: AS8346 Autonomous System
Port: Simple Mail Transfer 25
Found in one or more Blacklists
Date: 26/06/2019 2:08:59 AM UTC
2019-06-26 11:49:04
124.16.139.243 attackbotsspam
Jun 26 05:53:51 srv03 sshd\[11891\]: Invalid user jiu from 124.16.139.243 port 52038
Jun 26 05:53:51 srv03 sshd\[11891\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.16.139.243
Jun 26 05:53:53 srv03 sshd\[11891\]: Failed password for invalid user jiu from 124.16.139.243 port 52038 ssh2
2019-06-26 12:02:37
148.251.235.104 attackbots
20 attempts against mh-misbehave-ban on wave.magehost.pro
2019-06-26 11:50:33
178.33.233.54 attackbots
Jun 26 04:06:44 vserver sshd\[1210\]: Invalid user jeremy from 178.33.233.54Jun 26 04:06:46 vserver sshd\[1210\]: Failed password for invalid user jeremy from 178.33.233.54 port 42214 ssh2Jun 26 04:09:25 vserver sshd\[1272\]: Invalid user USERID from 178.33.233.54Jun 26 04:09:27 vserver sshd\[1272\]: Failed password for invalid user USERID from 178.33.233.54 port 57091 ssh2
...
2019-06-26 11:33:30

Recently Reported IPs

145.218.3.219 60.150.172.139 234.145.247.129 171.150.188.167
187.199.154.129 86.205.44.146 44.9.4.246 165.26.64.233
198.151.216.52 5.161.205.64 201.37.135.18 183.206.246.247
253.44.23.87 198.140.231.46 190.10.217.43 70.167.188.9
171.211.46.115 224.249.24.141 178.195.72.173 167.117.96.200