Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.212.39.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6005
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.212.39.3.			IN	A

;; AUTHORITY SECTION:
.			420	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:22:36 CST 2022
;; MSG SIZE  rcvd: 105
Host info
3.39.212.139.in-addr.arpa domain name pointer 3.39.212.139.adsl-pool.jlccptt.net.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
3.39.212.139.in-addr.arpa	name = 3.39.212.139.adsl-pool.jlccptt.net.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
187.189.109.138 attackspam
Invalid user server from 187.189.109.138 port 60308
2020-01-18 02:55:05
212.79.122.1 attack
Invalid user mario from 212.79.122.1 port 56801
2020-01-18 02:52:14
152.136.106.240 attack
Unauthorized connection attempt detected from IP address 152.136.106.240 to port 2220 [J]
2020-01-18 02:35:35
213.47.38.104 attackspam
Jan 17 14:36:37 ourumov-web sshd\[25774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.47.38.104  user=root
Jan 17 14:36:39 ourumov-web sshd\[25774\]: Failed password for root from 213.47.38.104 port 48570 ssh2
Jan 17 15:23:22 ourumov-web sshd\[28736\]: Invalid user bgp from 213.47.38.104 port 41316
...
2020-01-18 02:28:48
62.234.95.148 attack
Unauthorized connection attempt detected from IP address 62.234.95.148 to port 2220 [J]
2020-01-18 02:26:53
106.13.35.83 attackbots
$f2bV_matches
2020-01-18 02:26:32
167.172.51.11 attack
Unauthorized connection attempt detected from IP address 167.172.51.11 to port 2220 [J]
2020-01-18 02:25:20
51.75.28.134 attackspam
Unauthorized connection attempt detected from IP address 51.75.28.134 to port 2220 [J]
2020-01-18 02:46:39
212.237.63.28 attackbotsspam
Unauthorized connection attempt detected from IP address 212.237.63.28 to port 2220 [J]
2020-01-18 02:51:52
111.231.121.62 attackspambots
Triggered by Fail2Ban at Vostok web server
2020-01-18 02:41:21
49.232.92.95 attack
Unauthorized connection attempt detected from IP address 49.232.92.95 to port 2220 [J]
2020-01-18 02:47:16
142.93.211.52 attackspambots
Unauthorized connection attempt detected from IP address 142.93.211.52 to port 2220 [J]
2020-01-18 02:59:40
222.186.175.212 attack
Jan 17 19:26:03 MK-Soft-VM3 sshd[4284]: Failed password for root from 222.186.175.212 port 14258 ssh2
Jan 17 19:26:07 MK-Soft-VM3 sshd[4284]: Failed password for root from 222.186.175.212 port 14258 ssh2
...
2020-01-18 02:28:23
159.89.231.172 attackbots
SSH login attempts.
2020-01-18 02:34:24
207.180.235.201 attackspam
2020-01-18T05:12:27.105506luisaranguren sshd[2369500]: Invalid user gitadm from 207.180.235.201 port 46304
2020-01-18T05:12:28.995165luisaranguren sshd[2369500]: Failed password for invalid user gitadm from 207.180.235.201 port 46304 ssh2
...
2020-01-18 02:29:38

Recently Reported IPs

139.212.26.248 139.212.252.115 139.212.59.246 118.25.181.119
139.212.244.246 139.212.61.117 139.212.59.171 139.212.59.241
139.212.59.88 139.212.65.11 139.212.67.187 139.212.61.170
139.212.8.8 139.212.69.128 139.212.68.246 118.25.182.49
139.213.121.211 139.213.123.30 139.213.120.22 139.212.71.125