Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.226.20.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63259
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.226.20.196.			IN	A

;; AUTHORITY SECTION:
.			454	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 12:39:14 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 196.20.226.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 196.20.226.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
80.82.77.240 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-27 18:30:36
223.71.167.165 attackspam
Unauthorized connection attempt detected from IP address 223.71.167.165 to port 9653 [T]
2020-03-27 18:39:31
83.97.20.37 attackspambots
probes 7 times on the port 1080 3128 4567 5432 8080 8081 8089 resulting in total of 38 scans from 83.97.20.0/24 block.
2020-03-27 18:30:07
162.243.131.129 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-27 18:20:44
184.105.247.214 attackbotsspam
SMB Server BruteForce Attack
2020-03-27 18:55:41
162.243.131.75 attackspam
" "
2020-03-27 18:21:11
185.153.198.211 attackspambots
03/27/2020-05:55:38.447963 185.153.198.211 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-03-27 18:52:54
194.26.69.106 attack
03/27/2020-05:12:39.892931 194.26.69.106 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-03-27 18:04:18
185.175.93.14 attackbotsspam
[MK-VM4] Blocked by UFW
2020-03-27 18:51:03
179.96.62.29 attack
20/3/27@00:20:29: FAIL: Alarm-Network address from=179.96.62.29
...
2020-03-27 18:17:30
80.82.78.100 attackbotsspam
scans 3 times in preceeding hours on the ports (in chronological order) 6884 40831 41022 resulting in total of 133 scans from 80.82.64.0/20 block.
2020-03-27 19:04:37
119.249.54.162 attackbots
SIP/5060 Probe, BF, Hack -
2020-03-27 18:25:37
185.175.93.101 attackspam
firewall-block, port(s): 5907/tcp
2020-03-27 18:13:32
93.174.93.72 attack
scans 19 times in preceeding hours on the ports (in chronological order) 58998 36998 35998 46998 50998 41998 55998 47998 34543 34528 34539 34529 34538 34541 34544 34541 34530 34529 34543 resulting in total of 21 scans from 93.174.88.0/21 block.
2020-03-27 19:01:11
122.228.19.80 attack
firewall-block, port(s): 990/tcp, 6667/tcp
2020-03-27 18:59:59

Recently Reported IPs

139.226.58.245 139.226.58.41 139.226.33.54 139.226.58.178
139.226.58.96 139.227.144.32 139.228.14.20 139.227.114.89
139.227.68.224 139.227.167.51 139.255.194.114 139.255.197.50
139.255.9.243 139.255.9.74 139.255.93.197 139.255.99.163
139.255.99.162 139.28.137.94 139.28.122.99 139.28.140.152