Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.212.195.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38954
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.212.195.40.			IN	A

;; AUTHORITY SECTION:
.			42	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091600 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 16 15:29:51 CST 2022
;; MSG SIZE  rcvd: 107
Host info
40.195.212.139.in-addr.arpa domain name pointer 40.195.212.139.adsl-pool.jlccptt.net.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
40.195.212.139.in-addr.arpa	name = 40.195.212.139.adsl-pool.jlccptt.net.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
170.130.187.42 attack
Found on   Binary Defense     / proto=6  .  srcport=50042  .  dstport=5432  .     (3324)
2020-09-25 08:36:29
13.78.149.65 attackbots
Sep 25 02:23:08 vmd26974 sshd[12156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.78.149.65
Sep 25 02:23:11 vmd26974 sshd[12156]: Failed password for invalid user zaindoo from 13.78.149.65 port 1024 ssh2
...
2020-09-25 08:36:50
185.166.153.162 attackbots
Scanned 1 times in the last 24 hours on port 5060
2020-09-25 09:01:31
13.82.219.14 attack
2020-09-25T00:31:33.128452abusebot-2.cloudsearch.cf sshd[25044]: Invalid user huconn from 13.82.219.14 port 45287
2020-09-25T00:31:33.134709abusebot-2.cloudsearch.cf sshd[25044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.82.219.14
2020-09-25T00:31:33.128452abusebot-2.cloudsearch.cf sshd[25044]: Invalid user huconn from 13.82.219.14 port 45287
2020-09-25T00:31:34.994361abusebot-2.cloudsearch.cf sshd[25044]: Failed password for invalid user huconn from 13.82.219.14 port 45287 ssh2
2020-09-25T00:40:28.858154abusebot-2.cloudsearch.cf sshd[25170]: Invalid user bptrans from 13.82.219.14 port 7043
2020-09-25T00:40:28.865896abusebot-2.cloudsearch.cf sshd[25170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.82.219.14
2020-09-25T00:40:28.858154abusebot-2.cloudsearch.cf sshd[25170]: Invalid user bptrans from 13.82.219.14 port 7043
2020-09-25T00:40:30.169377abusebot-2.cloudsearch.cf sshd[25170]: Failed p
...
2020-09-25 08:43:03
167.99.88.51 attackspambots
$f2bV_matches
2020-09-25 09:09:03
73.202.250.217 attackbotsspam
(sshd) Failed SSH login from 73.202.250.217 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 24 15:52:56 iqdig9 sshd[26810]: Invalid user admin from 73.202.250.217
Sep 24 15:52:57 iqdig9 sshd[26814]: Invalid user admin from 73.202.250.217
Sep 24 15:52:58 iqdig9 sshd[26816]: Invalid user admin from 73.202.250.217
Sep 24 15:52:58 iqdig9 sshd[26818]: Invalid user admin from 73.202.250.217
Sep 24 15:52:59 iqdig9 sshd[26820]: Invalid user admin from 73.202.250.217
2020-09-25 08:47:58
49.86.26.89 attack
Brute forcing email accounts
2020-09-25 08:42:36
122.51.222.42 attackspam
SSH Invalid Login
2020-09-25 08:39:26
106.52.20.112 attackbotsspam
SSH Invalid Login
2020-09-25 08:49:38
23.102.162.4 attackspambots
Sep 25 02:34:41 ns381471 sshd[6397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.102.162.4
Sep 25 02:34:42 ns381471 sshd[6397]: Failed password for invalid user cendiatra from 23.102.162.4 port 42660 ssh2
2020-09-25 08:34:45
121.134.159.21 attackbotsspam
Sep 25 01:57:54 v22019038103785759 sshd\[17034\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21  user=root
Sep 25 01:57:56 v22019038103785759 sshd\[17034\]: Failed password for root from 121.134.159.21 port 43850 ssh2
Sep 25 02:01:56 v22019038103785759 sshd\[17377\]: Invalid user princess from 121.134.159.21 port 51704
Sep 25 02:01:56 v22019038103785759 sshd\[17377\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21
Sep 25 02:01:58 v22019038103785759 sshd\[17377\]: Failed password for invalid user princess from 121.134.159.21 port 51704 ssh2
...
2020-09-25 08:50:38
104.211.245.131 attack
2020-09-24 19:23:15.607141-0500  localhost sshd[50967]: Failed password for invalid user zaindoo from 104.211.245.131 port 4506 ssh2
2020-09-25 08:47:36
51.141.41.105 attack
Scanned 15 times in the last 24 hours on port 22
2020-09-25 08:30:18
112.85.42.174 attack
Sep 24 21:30:51 shivevps sshd[2840]: Failed password for root from 112.85.42.174 port 43147 ssh2
Sep 24 21:31:01 shivevps sshd[2840]: Failed password for root from 112.85.42.174 port 43147 ssh2
Sep 24 21:31:05 shivevps sshd[2840]: Failed password for root from 112.85.42.174 port 43147 ssh2
...
2020-09-25 08:33:03
137.135.125.41 attack
Sep 25 02:35:40 vpn01 sshd[15046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.135.125.41
Sep 25 02:35:41 vpn01 sshd[15046]: Failed password for invalid user cendiatra from 137.135.125.41 port 54589 ssh2
...
2020-09-25 08:53:12

Recently Reported IPs

121.230.106.46 198.72.234.90 209.124.88.143 197.253.232.79
112.213.198.71 54.207.118.108 59.167.159.78 60.52.69.46
154.29.64.218 161.132.209.246 51.142.156.134 95.251.142.107
104.197.14.36 186.155.39.245 45.148.127.36 170.83.126.218
154.201.33.131 121.127.252.48 139.162.41.163 120.85.112.42