Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.139.169.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41284
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;163.139.169.112.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019080700 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Aug 07 16:21:54 CST 2019
;; MSG SIZE  rcvd: 119
Host info
112.169.139.163.in-addr.arpa domain name pointer s112.GtokyoFL5.vectant.ne.jp.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
112.169.139.163.in-addr.arpa	name = s112.GtokyoFL5.vectant.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
187.73.70.43 attack
10 attempts against mh-misc-ban on milky
2020-04-18 23:49:33
206.189.208.233 attackspam
scans once in preceeding hours on the ports (in chronological order) 28511 resulting in total of 13 scans from 206.189.0.0/16 block.
2020-04-18 23:51:41
185.50.149.24 attackspam
SMTP nagging
2020-04-19 00:05:20
189.190.39.56 attackbots
SSH bruteforce (Triggered fail2ban)
2020-04-19 00:12:03
116.75.168.218 attackspambots
Apr 18 12:00:09 work-partkepr sshd\[32607\]: Invalid user ubuntu from 116.75.168.218 port 36250
Apr 18 12:00:09 work-partkepr sshd\[32607\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.75.168.218
...
2020-04-19 00:12:40
121.204.197.169 attack
Email rejected due to spam filtering
2020-04-18 23:36:40
146.185.130.101 attackbotsspam
SSH Brute-Force reported by Fail2Ban
2020-04-19 00:21:24
101.88.233.179 attackbots
Port probing on unauthorized port 81
2020-04-19 00:23:09
52.254.83.77 attack
Invalid user ll from 52.254.83.77 port 60486
2020-04-19 00:23:43
203.159.249.215 attackbots
SSH Brute-Forcing (server1)
2020-04-18 23:37:30
187.190.190.113 attack
Unauthorized connection attempt from IP address 187.190.190.113 on Port 445(SMB)
2020-04-19 00:08:02
89.188.160.51 attack
1587211204 - 04/18/2020 14:00:04 Host: 89.188.160.51/89.188.160.51 Port: 445 TCP Blocked
2020-04-19 00:14:27
110.49.103.98 attackbots
Unauthorised access (Apr 18) SRC=110.49.103.98 LEN=52 TTL=110 ID=19971 DF TCP DPT=445 WINDOW=8192 SYN
2020-04-18 23:40:36
187.146.201.22 attackspam
Unauthorized connection attempt from IP address 187.146.201.22 on Port 445(SMB)
2020-04-18 23:38:03
171.231.244.12 attack
Tried to hack email account
2020-04-19 00:09:50

Recently Reported IPs

111.39.13.136 160.137.211.233 167.206.71.167 220.242.179.16
211.208.251.195 142.14.194.47 69.44.143.6 29.123.252.130
25.204.78.144 190.114.233.44 131.128.104.23 12.206.100.36
207.149.112.117 161.244.160.209 129.71.206.75 72.65.10.43
111.44.146.28 186.183.200.49 109.103.37.235 98.6.214.182