Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Shanghai

Region: Shanghai

Country: China

Internet Service Provider: China Unicom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.227.31.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46004
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.227.31.199.			IN	A

;; AUTHORITY SECTION:
.			519	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020032601 1800 900 604800 86400

;; Query time: 99 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 27 05:28:28 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 199.31.227.139.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 199.31.227.139.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
106.12.21.124 attackbotsspam
Invalid user user from 106.12.21.124 port 48396
2020-05-12 06:57:28
121.15.7.26 attackspambots
May 12 01:51:25 hosting sshd[4828]: Invalid user ts3server from 121.15.7.26 port 36930
...
2020-05-12 07:09:17
93.174.93.195 attackbots
93.174.93.195 was recorded 7 times by 5 hosts attempting to connect to the following ports: 25524,25600. Incident counter (4h, 24h, all-time): 7, 59, 9104
2020-05-12 06:58:08
112.85.42.176 attackspambots
May 12 01:03:17 melroy-server sshd[4619]: Failed password for root from 112.85.42.176 port 47040 ssh2
May 12 01:03:21 melroy-server sshd[4619]: Failed password for root from 112.85.42.176 port 47040 ssh2
...
2020-05-12 07:26:39
180.166.141.58 attackbotsspam
May 12 01:12:11 debian-2gb-nbg1-2 kernel: \[11497596.149942\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=180.166.141.58 DST=195.201.40.59 LEN=40 TOS=0x08 PREC=0x00 TTL=237 ID=54875 PROTO=TCP SPT=50029 DPT=9859 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-12 07:19:30
123.146.23.149 attackspambots
Port probing on unauthorized port 6433
2020-05-12 07:26:13
222.186.15.62 attackbots
Tried sshing with brute force.
2020-05-12 07:08:13
114.7.164.250 attackspam
May 11 22:50:06 *** sshd[690]: Invalid user dreams from 114.7.164.250
2020-05-12 07:21:32
122.51.31.171 attackbots
Invalid user minecraft from 122.51.31.171 port 50414
2020-05-12 07:13:34
45.10.175.80 attackspam
May 11 22:34:31 debian-2gb-nbg1-2 kernel: \[11488137.321107\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.10.175.80 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=242 ID=55976 PROTO=TCP SPT=40494 DPT=5874 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-12 07:14:45
212.95.137.164 attackspambots
SSH invalid-user multiple login try
2020-05-12 07:27:02
223.136.205.47 attack
Port scan on 1 port(s): 15198
2020-05-12 07:03:36
125.124.180.71 attackspam
$f2bV_matches
2020-05-12 06:54:07
128.199.155.218 attackspam
May 11 22:32:09 OPSO sshd\[19303\]: Invalid user mail1 from 128.199.155.218 port 2400
May 11 22:32:09 OPSO sshd\[19303\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.155.218
May 11 22:32:11 OPSO sshd\[19303\]: Failed password for invalid user mail1 from 128.199.155.218 port 2400 ssh2
May 11 22:34:35 OPSO sshd\[19782\]: Invalid user git from 128.199.155.218 port 43004
May 11 22:34:35 OPSO sshd\[19782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.155.218
2020-05-12 07:12:47
111.229.111.160 attack
May 12 00:33:03 OPSO sshd\[11835\]: Invalid user fms from 111.229.111.160 port 39846
May 12 00:33:03 OPSO sshd\[11835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.111.160
May 12 00:33:05 OPSO sshd\[11835\]: Failed password for invalid user fms from 111.229.111.160 port 39846 ssh2
May 12 00:42:29 OPSO sshd\[14355\]: Invalid user ubnt from 111.229.111.160 port 59778
May 12 00:42:29 OPSO sshd\[14355\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.111.160
2020-05-12 06:56:16

Recently Reported IPs

222.248.60.252 66.122.216.133 87.143.31.107 218.78.36.159
94.149.112.112 67.253.45.79 106.45.54.216 112.49.81.242
95.201.250.124 1.128.109.31 212.150.72.59 107.212.60.237
84.135.179.249 116.239.205.121 141.236.120.9 202.27.20.198
116.132.53.89 46.229.113.183 174.251.63.88 105.71.146.107