Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.221.137.160
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31511
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.221.137.160.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 09:59:02 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 160.137.221.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 160.137.221.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
177.83.41.16 attackbots
Attempts against non-existent wp-login
2020-10-06 21:57:21
5.69.18.121 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-10-06 22:12:36
191.217.170.33 attackbotsspam
2020-10-06T08:19:30.869018dreamphreak.com sshd[546116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.217.170.33  user=root
2020-10-06T08:19:32.998602dreamphreak.com sshd[546116]: Failed password for root from 191.217.170.33 port 60320 ssh2
...
2020-10-06 22:33:19
36.148.12.251 attackspambots
36.148.12.251 (CN/China/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Oct  6 08:03:19 server2 sshd[16120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.148.12.251  user=root
Oct  6 08:03:21 server2 sshd[16120]: Failed password for root from 36.148.12.251 port 42950 ssh2
Oct  6 08:04:23 server2 sshd[16963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.159.75  user=root
Oct  6 08:03:09 server2 sshd[15908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.133.220  user=root
Oct  6 08:03:11 server2 sshd[15908]: Failed password for root from 118.25.133.220 port 36856 ssh2
Oct  6 08:03:11 server2 sshd[16058]: Failed password for root from 189.14.40.146 port 46200 ssh2

IP Addresses Blocked:
2020-10-06 22:09:01
212.112.126.85 attack
$f2bV_matches
2020-10-06 22:04:41
185.239.106.134 attackbots
Oct  6 16:10:13 con01 sshd[397409]: Failed password for root from 185.239.106.134 port 33836 ssh2
Oct  6 16:14:24 con01 sshd[405239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.239.106.134  user=root
Oct  6 16:14:26 con01 sshd[405239]: Failed password for root from 185.239.106.134 port 39634 ssh2
Oct  6 16:18:37 con01 sshd[412558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.239.106.134  user=root
Oct  6 16:18:39 con01 sshd[412558]: Failed password for root from 185.239.106.134 port 45376 ssh2
...
2020-10-06 22:23:20
116.196.90.254 attackbots
Oct  6 13:34:55 sshgateway sshd\[28596\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.90.254  user=root
Oct  6 13:34:57 sshgateway sshd\[28596\]: Failed password for root from 116.196.90.254 port 58974 ssh2
Oct  6 13:38:11 sshgateway sshd\[28642\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.90.254  user=root
2020-10-06 22:35:58
91.221.134.137 attackbotsspam
mail auth brute force
2020-10-06 22:00:40
157.230.245.91 attack
TCP port : 1517
2020-10-06 21:58:40
122.194.229.122 attackspambots
Oct  6 15:34:11 mavik sshd[20075]: Failed password for root from 122.194.229.122 port 61482 ssh2
Oct  6 15:34:14 mavik sshd[20075]: Failed password for root from 122.194.229.122 port 61482 ssh2
Oct  6 15:34:18 mavik sshd[20075]: Failed password for root from 122.194.229.122 port 61482 ssh2
Oct  6 15:34:21 mavik sshd[20075]: Failed password for root from 122.194.229.122 port 61482 ssh2
Oct  6 15:34:24 mavik sshd[20075]: Failed password for root from 122.194.229.122 port 61482 ssh2
...
2020-10-06 22:35:28
102.165.30.57 attack
 TCP (SYN) 102.165.30.57:58040 -> port 60000, len 44
2020-10-06 21:57:34
40.77.167.63 attackspambots
Automatic report - Banned IP Access
2020-10-06 21:58:07
119.45.46.212 attackspambots
(sshd) Failed SSH login from 119.45.46.212 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  6 04:21:05 optimus sshd[31153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.46.212  user=root
Oct  6 04:21:08 optimus sshd[31153]: Failed password for root from 119.45.46.212 port 47030 ssh2
Oct  6 04:25:10 optimus sshd[32610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.46.212  user=root
Oct  6 04:25:12 optimus sshd[32610]: Failed password for root from 119.45.46.212 port 35032 ssh2
Oct  6 04:29:15 optimus sshd[4055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.46.212  user=root
2020-10-06 22:17:26
117.213.67.250 attackbots
Port scan on 1 port(s): 445
2020-10-06 22:23:40
117.69.231.120 attack
Lines containing failures of 117.69.231.120
Oct  5 04:22:58 shared02 sshd[2602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.69.231.120  user=r.r
Oct  5 04:23:00 shared02 sshd[2602]: Failed password for r.r from 117.69.231.120 port 44556 ssh2
Oct  5 04:23:00 shared02 sshd[2602]: Received disconnect from 117.69.231.120 port 44556:11: Bye Bye [preauth]
Oct  5 04:23:00 shared02 sshd[2602]: Disconnected from authenticating user r.r 117.69.231.120 port 44556 [preauth]
Oct  5 04:33:54 shared02 sshd[7481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.69.231.120  user=r.r
Oct  5 04:33:55 shared02 sshd[7481]: Failed password for r.r from 117.69.231.120 port 60368 ssh2
Oct  5 04:33:56 shared02 sshd[7481]: Received disconnect from 117.69.231.120 port 60368:11: Bye Bye [preauth]
Oct  5 04:33:56 shared02 sshd[7481]: Disconnected from authenticating user r.r 117.69.231.120 port 60368 [preaut........
------------------------------
2020-10-06 22:08:06

Recently Reported IPs

97.97.190.106 188.76.153.119 86.91.185.91 61.187.139.184
202.186.100.204 78.206.78.123 190.227.102.62 248.87.192.176
43.236.120.162 177.79.139.249 9.216.222.194 73.64.26.18
174.145.190.56 99.85.193.68 96.145.216.203 19.25.230.88
153.44.161.210 242.236.25.94 8.223.169.112 178.234.95.236