Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.213.200.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53854
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.213.200.197.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 18:36:40 CST 2025
;; MSG SIZE  rcvd: 108
Host info
197.200.213.139.in-addr.arpa domain name pointer 197.200.213.139.adsl-pool.jlccptt.net.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
197.200.213.139.in-addr.arpa	name = 197.200.213.139.adsl-pool.jlccptt.net.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
96.240.21.77 attackspam
Oct 11 23:51:09 OPSO sshd\[2196\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.240.21.77  user=root
Oct 11 23:51:12 OPSO sshd\[2196\]: Failed password for root from 96.240.21.77 port 46268 ssh2
Oct 11 23:54:41 OPSO sshd\[3323\]: Invalid user jeffrey from 96.240.21.77 port 51680
Oct 11 23:54:41 OPSO sshd\[3323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.240.21.77
Oct 11 23:54:43 OPSO sshd\[3323\]: Failed password for invalid user jeffrey from 96.240.21.77 port 51680 ssh2
2020-10-12 12:16:43
88.157.239.6 attack
88.157.239.6 - - [11/Oct/2020:21:43:10 +0200] "POST /xmlrpc.php HTTP/1.1" 403 461 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
88.157.239.6 - - [11/Oct/2020:21:51:32 +0200] "POST /xmlrpc.php HTTP/1.1" 403 616 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-12 07:53:39
116.228.37.90 attackbotsspam
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-10-12T03:23:46Z and 2020-10-12T03:28:15Z
2020-10-12 12:13:47
103.223.9.13 attackbotsspam
Icarus honeypot on github
2020-10-12 07:44:19
185.42.170.203 attackbotsspam
Oct 11 21:49:24 localhost sshd\[14554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.42.170.203  user=root
Oct 11 21:49:25 localhost sshd\[14554\]: Failed password for root from 185.42.170.203 port 31038 ssh2
Oct 11 21:49:27 localhost sshd\[14554\]: Failed password for root from 185.42.170.203 port 31038 ssh2
...
2020-10-12 07:49:52
49.235.35.65 attack
Oct 12 01:24:48 pve1 sshd[4353]: Failed password for root from 49.235.35.65 port 35190 ssh2
Oct 12 01:33:31 pve1 sshd[8047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.35.65 
...
2020-10-12 07:48:12
123.126.40.29 attackbotsspam
(sshd) Failed SSH login from 123.126.40.29 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 11 20:15:44 server sshd[13950]: Invalid user brianna from 123.126.40.29
Oct 11 20:15:44 server sshd[13950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.126.40.29 
Oct 11 20:15:46 server sshd[13950]: Failed password for invalid user brianna from 123.126.40.29 port 35890 ssh2
Oct 11 20:18:42 server sshd[14379]: Invalid user fujiwara from 123.126.40.29
Oct 11 20:18:42 server sshd[14379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.126.40.29
2020-10-12 07:43:04
66.57.151.234 attack
Icarus honeypot on github
2020-10-12 07:56:13
68.183.120.37 attackbotsspam
Oct 11 23:30:39 ip-172-31-42-142 sshd\[1981\]: Invalid user hans from 68.183.120.37\
Oct 11 23:30:40 ip-172-31-42-142 sshd\[1981\]: Failed password for invalid user hans from 68.183.120.37 port 32894 ssh2\
Oct 11 23:32:24 ip-172-31-42-142 sshd\[1999\]: Invalid user foster from 68.183.120.37\
Oct 11 23:32:26 ip-172-31-42-142 sshd\[1999\]: Failed password for invalid user foster from 68.183.120.37 port 37216 ssh2\
Oct 11 23:34:12 ip-172-31-42-142 sshd\[2027\]: Failed password for root from 68.183.120.37 port 41542 ssh2\
2020-10-12 07:46:04
202.129.28.14 attack
Oct 12 05:20:41 host1 sshd[1984572]: Invalid user ved from 202.129.28.14 port 42246
Oct 12 05:20:41 host1 sshd[1984572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.129.28.14 
Oct 12 05:20:41 host1 sshd[1984572]: Invalid user ved from 202.129.28.14 port 42246
Oct 12 05:20:43 host1 sshd[1984572]: Failed password for invalid user ved from 202.129.28.14 port 42246 ssh2
Oct 12 05:24:22 host1 sshd[1984902]: Invalid user ruiz from 202.129.28.14 port 37548
...
2020-10-12 12:14:38
124.235.138.34 attackbots
user  not found%3a http%3a%2f%2f123.125.114.144%2f
2020-10-12 12:05:19
85.209.0.94 attackspam
port scan and connect, tcp 22 (ssh)
2020-10-12 12:03:46
159.65.77.254 attackbotsspam
[f2b] sshd bruteforce, retries: 1
2020-10-12 08:01:56
112.85.42.13 attackspam
2020-10-12T01:43:59.917055vps773228.ovh.net sshd[7656]: Failed password for root from 112.85.42.13 port 44364 ssh2
2020-10-12T01:44:02.909633vps773228.ovh.net sshd[7656]: Failed password for root from 112.85.42.13 port 44364 ssh2
2020-10-12T01:44:05.647213vps773228.ovh.net sshd[7656]: Failed password for root from 112.85.42.13 port 44364 ssh2
2020-10-12T01:44:08.323443vps773228.ovh.net sshd[7656]: Failed password for root from 112.85.42.13 port 44364 ssh2
2020-10-12T01:44:11.747066vps773228.ovh.net sshd[7656]: Failed password for root from 112.85.42.13 port 44364 ssh2
...
2020-10-12 07:47:41
51.91.136.28 attack
51.91.136.28 - - [11/Oct/2020:23:30:44 +0100] "POST /wp-login.php HTTP/1.1" 200 2426 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.91.136.28 - - [11/Oct/2020:23:30:46 +0100] "POST /wp-login.php HTTP/1.1" 200 2407 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.91.136.28 - - [11/Oct/2020:23:30:46 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-12 07:58:25

Recently Reported IPs

76.88.30.50 235.77.202.209 98.17.37.28 65.22.57.185
230.70.241.148 38.225.249.49 45.10.57.59 223.250.195.243
122.227.13.181 120.191.85.75 120.77.167.193 208.73.192.56
96.40.21.106 247.191.166.55 189.187.143.45 134.108.98.209
235.11.3.207 140.167.17.140 243.137.115.221 26.1.157.227