Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Changchun

Region: Jilin

Country: China

Internet Service Provider: China Unicom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.214.236.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15632
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.214.236.71.			IN	A

;; AUTHORITY SECTION:
.			498	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019121401 1800 900 604800 86400

;; Query time: 165 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 15 03:32:44 CST 2019
;; MSG SIZE  rcvd: 118
Host info
71.236.214.139.in-addr.arpa domain name pointer 71.236.214.139.adsl-pool.jlccptt.net.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
71.236.214.139.in-addr.arpa	name = 71.236.214.139.adsl-pool.jlccptt.net.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
113.160.198.75 attack
1598533219 - 08/27/2020 15:00:19 Host: 113.160.198.75/113.160.198.75 Port: 445 TCP Blocked
2020-08-28 00:41:19
94.102.49.193 attackbotsspam
$f2bV_matches
2020-08-28 00:58:34
190.186.115.172 attackspam
trying to access non-authorized port
2020-08-28 01:10:57
41.94.22.207 attackspam
IP 41.94.22.207 attacked honeypot on port: 1433 at 8/27/2020 6:00:13 AM
2020-08-28 00:46:23
106.12.115.169 attackbots
Aug 27 17:01:13 pornomens sshd\[17912\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.115.169  user=root
Aug 27 17:01:15 pornomens sshd\[17912\]: Failed password for root from 106.12.115.169 port 49414 ssh2
Aug 27 17:06:27 pornomens sshd\[17968\]: Invalid user ram from 106.12.115.169 port 49310
Aug 27 17:06:27 pornomens sshd\[17968\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.115.169
...
2020-08-28 01:12:58
125.160.192.196 attack
Unauthorized connection attempt from IP address 125.160.192.196 on Port 445(SMB)
2020-08-28 00:36:18
122.226.245.178 attackspam
Unauthorized connection attempt from IP address 122.226.245.178 on Port 445(SMB)
2020-08-28 00:52:23
162.142.125.18 attackspambots
 TCP (SYN) 162.142.125.18:57317 -> port 3306, len 44
2020-08-28 00:40:28
125.25.44.57 attack
Unauthorised access (Aug 27) SRC=125.25.44.57 LEN=40 TTL=53 ID=58829 TCP DPT=8080 WINDOW=9337 SYN 
Unauthorised access (Aug 27) SRC=125.25.44.57 LEN=40 TOS=0x10 PREC=0x40 TTL=52 ID=32606 TCP DPT=8080 WINDOW=9337 SYN
2020-08-28 01:07:11
218.92.0.133 attackbotsspam
Aug 27 16:22:46 ip-172-31-61-156 sshd[16656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.133  user=root
Aug 27 16:22:48 ip-172-31-61-156 sshd[16656]: Failed password for root from 218.92.0.133 port 27247 ssh2
...
2020-08-28 00:47:07
95.38.214.7 attack
Unauthorized connection attempt from IP address 95.38.214.7 on Port 445(SMB)
2020-08-28 00:45:58
104.183.217.130 attackbots
Invalid user ubuntu from 104.183.217.130 port 54634
2020-08-28 01:13:12
223.71.232.246 attackbotsspam
Auto Detect Rule!
proto TCP (SYN), 223.71.232.246:2729->gjan.info:1433, len 44
2020-08-28 00:46:36
49.156.32.184 attackspambots
Automatic report - Banned IP Access
2020-08-28 00:59:24
222.186.180.6 attackbots
Aug 27 18:48:08 abendstille sshd\[25691\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.6  user=root
Aug 27 18:48:10 abendstille sshd\[25752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.6  user=root
Aug 27 18:48:10 abendstille sshd\[25691\]: Failed password for root from 222.186.180.6 port 23588 ssh2
Aug 27 18:48:13 abendstille sshd\[25752\]: Failed password for root from 222.186.180.6 port 61438 ssh2
Aug 27 18:48:14 abendstille sshd\[25691\]: Failed password for root from 222.186.180.6 port 23588 ssh2
...
2020-08-28 01:03:12

Recently Reported IPs

99.165.141.20 112.114.151.158 222.183.93.48 123.24.150.203
109.192.75.92 100.33.188.194 179.140.141.85 203.106.100.86
104.34.231.112 124.16.179.240 198.91.121.33 75.107.207.207
220.243.184.131 138.97.36.180 94.78.157.151 138.47.7.225
126.220.7.215 116.203.80.96 236.205.255.254 87.78.63.131