Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Changchun

Region: Jilin

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.214.56.205
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65249
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.214.56.205.			IN	A

;; AUTHORITY SECTION:
.			392	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020101 1800 900 604800 86400

;; Query time: 110 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 19:21:06 CST 2020
;; MSG SIZE  rcvd: 118
Host info
205.56.214.139.in-addr.arpa domain name pointer 205.56.214.139.adsl-pool.jlccptt.net.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
205.56.214.139.in-addr.arpa	name = 205.56.214.139.adsl-pool.jlccptt.net.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
138.68.171.25 attackspam
(sshd) Failed SSH login from 138.68.171.25 (GB/United Kingdom/-): 5 in the last 3600 secs
2020-04-13 05:14:05
162.243.131.5 attack
4332/tcp 2049/tcp 5432/tcp...
[2020-02-13/04-12]21pkt,20pt.(tcp),1pt.(udp)
2020-04-13 05:18:42
103.219.112.31 attackbotsspam
7346/tcp 1536/tcp 32255/tcp...
[2020-03-29/04-12]51pkt,17pt.(tcp)
2020-04-13 05:27:46
195.181.210.5 attackbotsspam
(sshd) Failed SSH login from 195.181.210.5 (CZ/Czechia/5.210.forpsi.net): 10 in the last 3600 secs
2020-04-13 05:15:42
198.108.67.61 attackspambots
18017/tcp 502/tcp 12372/tcp...
[2020-02-11/04-11]74pkt,71pt.(tcp)
2020-04-13 05:52:47
111.231.75.5 attack
Apr 12 22:33:08 meumeu sshd[28522]: Failed password for root from 111.231.75.5 port 57862 ssh2
Apr 12 22:37:07 meumeu sshd[29047]: Failed password for root from 111.231.75.5 port 45062 ssh2
...
2020-04-13 05:29:30
77.247.108.77 attackspambots
9443/tcp 8989/tcp 9089/tcp...
[2020-02-28/04-12]523pkt,31pt.(tcp)
2020-04-13 05:44:58
193.169.252.228 attackspambots
$f2bV_matches
2020-04-13 05:32:55
101.89.95.77 attackspam
Apr 12 23:04:32 srv-ubuntu-dev3 sshd[51010]: Invalid user bmm from 101.89.95.77
Apr 12 23:04:32 srv-ubuntu-dev3 sshd[51010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.95.77
Apr 12 23:04:32 srv-ubuntu-dev3 sshd[51010]: Invalid user bmm from 101.89.95.77
Apr 12 23:04:34 srv-ubuntu-dev3 sshd[51010]: Failed password for invalid user bmm from 101.89.95.77 port 53440 ssh2
Apr 12 23:08:26 srv-ubuntu-dev3 sshd[51646]: Invalid user bjconsultants from 101.89.95.77
Apr 12 23:08:26 srv-ubuntu-dev3 sshd[51646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.95.77
Apr 12 23:08:26 srv-ubuntu-dev3 sshd[51646]: Invalid user bjconsultants from 101.89.95.77
Apr 12 23:08:29 srv-ubuntu-dev3 sshd[51646]: Failed password for invalid user bjconsultants from 101.89.95.77 port 49678 ssh2
Apr 12 23:12:19 srv-ubuntu-dev3 sshd[52264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser=
...
2020-04-13 05:32:31
109.62.161.84 attackspambots
SSH brute force attempt
2020-04-13 05:42:01
191.189.30.241 attack
Apr 12 23:44:14 vpn01 sshd[18067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.189.30.241
Apr 12 23:44:16 vpn01 sshd[18067]: Failed password for invalid user mysql from 191.189.30.241 port 60635 ssh2
...
2020-04-13 05:49:15
222.186.173.226 attackspam
04/12/2020-17:28:51.679902 222.186.173.226 Protocol: 6 ET SCAN Potential SSH Scan
2020-04-13 05:31:17
121.7.127.92 attackbots
SSH brute force attempt
2020-04-13 05:14:35
192.241.238.17 attack
2343/tcp 1434/udp 5601/tcp...
[2020-02-14/04-12]45pkt,36pt.(tcp),3pt.(udp)
2020-04-13 05:49:26
49.233.90.8 attackbots
Apr 12 23:00:50 localhost sshd\[19994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.90.8  user=root
Apr 12 23:00:52 localhost sshd\[19994\]: Failed password for root from 49.233.90.8 port 50600 ssh2
Apr 12 23:04:55 localhost sshd\[20151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.90.8  user=root
Apr 12 23:04:57 localhost sshd\[20151\]: Failed password for root from 49.233.90.8 port 38912 ssh2
Apr 12 23:08:53 localhost sshd\[20434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.90.8  user=root
...
2020-04-13 05:22:35

Recently Reported IPs

73.19.211.129 35.209.170.24 49.234.21.88 222.129.62.14
55.14.70.111 176.255.255.88 239.182.204.70 220.218.146.220
222.129.62.10 189.84.154.125 137.190.39.158 116.242.195.30
214.62.117.132 222.129.61.246 51.240.238.3 33.141.221.175
200.134.44.165 94.90.139.173 222.129.61.243 26.70.81.250