Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: China Unicom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.5.62.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3706
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.5.62.124.			IN	A

;; AUTHORITY SECTION:
.			525	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020100102 1800 900 604800 86400

;; Query time: 112 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 02 09:35:55 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 124.62.5.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 124.62.5.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.42.227.236 attackbots
Absender hat Spam-Falle ausgel?st
2019-11-05 20:18:46
118.70.196.124 attack
Absender hat Spam-Falle ausgel?st
2019-11-05 20:25:13
209.173.253.226 attack
2019-11-05T09:29:50.027305abusebot-7.cloudsearch.cf sshd\[14038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.173.253.226  user=root
2019-11-05 20:04:19
212.67.0.150 attack
Absender hat Spam-Falle ausgel?st
2019-11-05 20:10:05
170.79.120.129 attack
Absender hat Spam-Falle ausgel?st
2019-11-05 20:23:28
110.172.130.206 attackspam
Absender hat Spam-Falle ausgel?st
2019-11-05 20:26:42
195.191.131.150 attackspambots
Absender hat Spam-Falle ausgel?st
2019-11-05 20:14:15
150.95.186.200 attackbotsspam
Nov  5 10:29:03 localhost sshd\[28504\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.95.186.200  user=root
Nov  5 10:29:05 localhost sshd\[28504\]: Failed password for root from 150.95.186.200 port 43862 ssh2
Nov  5 10:47:31 localhost sshd\[28782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.95.186.200  user=root
...
2019-11-05 20:05:28
95.38.169.231 attack
Absender hat Spam-Falle ausgel?st
2019-11-05 20:31:27
112.21.191.244 attackspam
2019-11-05T11:22:02.335567shield sshd\[5578\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.21.191.244  user=root
2019-11-05T11:22:04.922367shield sshd\[5578\]: Failed password for root from 112.21.191.244 port 57092 ssh2
2019-11-05T11:27:00.296612shield sshd\[6208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.21.191.244  user=root
2019-11-05T11:27:02.461471shield sshd\[6208\]: Failed password for root from 112.21.191.244 port 34184 ssh2
2019-11-05T11:32:00.125786shield sshd\[6747\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.21.191.244  user=root
2019-11-05 20:08:19
183.105.217.170 attack
Nov  5 12:56:48 minden010 sshd[1181]: Failed password for root from 183.105.217.170 port 43551 ssh2
Nov  5 13:01:14 minden010 sshd[2917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.105.217.170
Nov  5 13:01:16 minden010 sshd[2917]: Failed password for invalid user filmlight from 183.105.217.170 port 34994 ssh2
...
2019-11-05 20:08:33
98.6.168.194 attackbots
proto=tcp  .  spt=56020  .  dpt=25  .     (Found on   Dark List de Nov 05)     (461)
2019-11-05 20:29:54
178.33.185.70 attackbots
Nov  5 10:14:16 lnxweb61 sshd[29580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.185.70
Nov  5 10:14:17 lnxweb61 sshd[29580]: Failed password for invalid user montana from 178.33.185.70 port 7188 ssh2
Nov  5 10:17:57 lnxweb61 sshd[1142]: Failed password for root from 178.33.185.70 port 48638 ssh2
2019-11-05 20:05:55
115.203.59.33 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-11-05 20:06:39
103.102.141.62 attackspambots
Absender hat Spam-Falle ausgel?st
2019-11-05 20:28:10

Recently Reported IPs

75.22.175.69 172.95.39.26 63.27.77.7 222.124.248.171
218.208.72.213 204.59.2.211 105.166.104.87 52.61.156.51
187.105.31.246 218.215.149.131 34.126.106.210 82.21.194.149
37.26.18.113 201.55.174.89 180.57.165.181 216.239.22.66
63.85.182.137 52.64.230.9 37.175.86.207 178.195.215.154