Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan (Province of China)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.142.139.253
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35103
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;220.142.139.253.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 14:55:39 CST 2025
;; MSG SIZE  rcvd: 108
Host info
253.139.142.220.in-addr.arpa domain name pointer 220-142-139-253.dynamic-ip.hinet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
253.139.142.220.in-addr.arpa	name = 220-142-139-253.dynamic-ip.hinet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
128.199.52.45 attackbotsspam
Invalid user ftpuser from 128.199.52.45 port 56658
2020-04-22 03:45:10
128.199.72.96 attack
Invalid user gu from 128.199.72.96 port 35098
2020-04-22 03:44:49
190.90.219.3 attackbots
Invalid user ntp from 190.90.219.3 port 4105
2020-04-22 03:22:14
168.232.129.181 attackspambots
Invalid user admin from 168.232.129.181 port 59364
2020-04-22 03:31:14
181.63.248.149 attackbotsspam
Apr 21 18:20:50 * sshd[17454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.63.248.149
Apr 21 18:20:52 * sshd[17454]: Failed password for invalid user m from 181.63.248.149 port 37814 ssh2
2020-04-22 03:27:25
202.107.238.14 attackbots
5x Failed Password
2020-04-22 03:17:11
177.189.210.148 attack
Invalid user svn from 177.189.210.148 port 53257
2020-04-22 03:29:43
132.232.79.135 attackspambots
2020-04-21T15:26:09.887887abusebot-8.cloudsearch.cf sshd[14720]: Invalid user vf from 132.232.79.135 port 41674
2020-04-21T15:26:09.902020abusebot-8.cloudsearch.cf sshd[14720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.79.135
2020-04-21T15:26:09.887887abusebot-8.cloudsearch.cf sshd[14720]: Invalid user vf from 132.232.79.135 port 41674
2020-04-21T15:26:12.088004abusebot-8.cloudsearch.cf sshd[14720]: Failed password for invalid user vf from 132.232.79.135 port 41674 ssh2
2020-04-21T15:29:11.666887abusebot-8.cloudsearch.cf sshd[14875]: Invalid user iy from 132.232.79.135 port 42704
2020-04-21T15:29:11.681606abusebot-8.cloudsearch.cf sshd[14875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.79.135
2020-04-21T15:29:11.666887abusebot-8.cloudsearch.cf sshd[14875]: Invalid user iy from 132.232.79.135 port 42704
2020-04-21T15:29:14.188427abusebot-8.cloudsearch.cf sshd[14875]: Failed passwor
...
2020-04-22 03:41:06
202.79.172.29 attack
Apr 21 14:33:12 jane sshd[26840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.79.172.29 
Apr 21 14:33:15 jane sshd[26840]: Failed password for invalid user testing from 202.79.172.29 port 55056 ssh2
...
2020-04-22 03:17:39
159.89.170.154 attackspam
SSH brute-force: detected 6 distinct usernames within a 24-hour window.
2020-04-22 03:32:38
193.112.98.79 attackbots
Invalid user cx from 193.112.98.79 port 51212
2020-04-22 03:20:40
129.211.26.12 attack
Invalid user postgres from 129.211.26.12 port 59440
2020-04-22 03:42:43
129.28.183.142 attack
2020-04-21T19:02:51.249367abusebot-8.cloudsearch.cf sshd[29057]: Invalid user git from 129.28.183.142 port 42972
2020-04-21T19:02:51.259710abusebot-8.cloudsearch.cf sshd[29057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.183.142
2020-04-21T19:02:51.249367abusebot-8.cloudsearch.cf sshd[29057]: Invalid user git from 129.28.183.142 port 42972
2020-04-21T19:02:53.393862abusebot-8.cloudsearch.cf sshd[29057]: Failed password for invalid user git from 129.28.183.142 port 42972 ssh2
2020-04-21T19:12:07.005430abusebot-8.cloudsearch.cf sshd[29804]: Invalid user test from 129.28.183.142 port 57888
2020-04-21T19:12:07.014412abusebot-8.cloudsearch.cf sshd[29804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.183.142
2020-04-21T19:12:07.005430abusebot-8.cloudsearch.cf sshd[29804]: Invalid user test from 129.28.183.142 port 57888
2020-04-21T19:12:09.479474abusebot-8.cloudsearch.cf sshd[29804]: Failed 
...
2020-04-22 03:43:26
128.199.91.233 attackspam
k+ssh-bruteforce
2020-04-22 03:44:34
138.197.110.41 attack
Invalid user git from 138.197.110.41 port 46246
2020-04-22 03:38:59

Recently Reported IPs

193.62.52.108 47.166.14.49 56.180.211.147 95.52.50.162
124.79.63.144 35.122.171.164 52.122.237.222 165.171.240.156
118.45.78.73 130.30.181.203 211.247.249.99 252.217.71.128
27.224.194.8 54.59.2.215 67.177.52.122 137.230.234.48
164.147.157.98 202.167.54.244 119.186.201.234 52.94.205.4