Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ōami

Region: Chiba

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 160.11.203.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5900
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;160.11.203.139.			IN	A

;; AUTHORITY SECTION:
.			151	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020090100 1800 900 604800 86400

;; Query time: 102 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 02 00:19:52 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 139.203.11.160.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.203.11.160.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
167.71.145.201 attackbotsspam
2020-10-07T15:11:56.703523snf-827550 sshd[25302]: Failed password for root from 167.71.145.201 port 38500 ssh2
2020-10-07T15:15:32.075162snf-827550 sshd[25379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.145.201  user=root
2020-10-07T15:15:34.059685snf-827550 sshd[25379]: Failed password for root from 167.71.145.201 port 45046 ssh2
...
2020-10-08 02:31:00
195.133.147.8 attack
Oct  7 20:10:26 fhem-rasp sshd[16996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.133.147.8  user=root
Oct  7 20:10:28 fhem-rasp sshd[16996]: Failed password for root from 195.133.147.8 port 54662 ssh2
...
2020-10-08 02:37:16
116.88.140.247 attackspam
Automatic report - Port Scan Attack
2020-10-08 02:03:38
148.72.207.135 attackbotsspam
probing for vulnerabilities, found a honeypot
2020-10-08 02:26:54
140.143.187.21 attackspam
[f2b] sshd bruteforce, retries: 1
2020-10-08 02:06:57
185.126.202.157 attackspam
MYH,DEF GET /wp-login.php
2020-10-08 02:36:36
159.89.237.235 attack
159.89.237.235 - - [07/Oct/2020:05:52:13 +0200] "POST /wp-login.php HTTP/1.0" 200 4794 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-08 02:21:05
198.12.248.77 attack
xmlrpc attack
2020-10-08 02:34:55
45.148.10.186 attack
Oct  7 sshd[10786]: Invalid user postgres from 45.148.10.186 port 41436
2020-10-08 02:10:39
119.45.114.182 attackbotsspam
SSH login attempts.
2020-10-08 02:07:58
113.3.56.243 attackbots
Auto Detect Rule!
proto TCP (SYN), 113.3.56.243:18799->gjan.info:23, len 40
2020-10-08 02:33:09
163.172.24.135 attackspam
2020-10-07T08:30:55.983734linuxbox-skyline sshd[34658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.24.135  user=root
2020-10-07T08:30:58.254991linuxbox-skyline sshd[34658]: Failed password for root from 163.172.24.135 port 38150 ssh2
...
2020-10-08 02:20:34
185.191.171.23 attack
20 attempts against mh-misbehave-ban on maple
2020-10-08 02:27:38
82.164.156.84 attackbotsspam
 TCP (SYN) 82.164.156.84:49565 -> port 22327, len 44
2020-10-08 02:13:10
167.99.1.98 attackspambots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-10-08 02:32:19

Recently Reported IPs

156.223.246.180 125.25.197.66 36.85.204.198 91.121.51.57
189.188.98.234 157.32.254.122 154.117.11.192 49.81.30.42
138.59.146.201 112.133.194.58 182.253.24.2 68.60.203.58
78.79.234.169 69.0.96.162 27.193.126.60 67.2.226.238
156.192.186.173 119.86.182.229 215.115.226.111 69.207.175.94