Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 221.139.175.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37771
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;221.139.175.6.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 11:22:08 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 6.175.139.221.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 6.175.139.221.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
104.206.128.38 attackspambots
Trying ports that it shouldn't be.
2019-12-28 04:56:46
178.62.125.123 attackspam
12/27/2019-22:03:28.546213 178.62.125.123 Protocol: 6 ET CHAT IRC PING command
2019-12-28 05:15:54
201.68.127.114 attackbotsspam
Unauthorized connection attempt from IP address 201.68.127.114 on Port 445(SMB)
2019-12-28 05:13:07
159.203.190.189 attackspambots
Dec 27 16:27:55 localhost sshd\[18871\]: Invalid user stavek from 159.203.190.189 port 55328
Dec 27 16:27:55 localhost sshd\[18871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.190.189
Dec 27 16:27:57 localhost sshd\[18871\]: Failed password for invalid user stavek from 159.203.190.189 port 55328 ssh2
2019-12-28 05:20:52
112.120.108.155 attackbotsspam
SIP/5060 Probe, BF, Hack -
2019-12-28 04:46:07
184.22.20.216 attack
Unauthorized connection attempt from IP address 184.22.20.216 on Port 445(SMB)
2019-12-28 05:09:49
112.119.184.215 attackspam
SIP/5060 Probe, BF, Hack -
2019-12-28 04:47:11
104.206.128.66 attackspambots
scan z
2019-12-28 04:46:37
192.99.244.225 attackspam
Dec 27 15:46:02 tuxlinux sshd[13590]: Invalid user laale from 192.99.244.225 port 38030
Dec 27 15:46:02 tuxlinux sshd[13590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.244.225 
Dec 27 15:46:02 tuxlinux sshd[13590]: Invalid user laale from 192.99.244.225 port 38030
Dec 27 15:46:02 tuxlinux sshd[13590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.244.225 
Dec 27 15:46:02 tuxlinux sshd[13590]: Invalid user laale from 192.99.244.225 port 38030
Dec 27 15:46:02 tuxlinux sshd[13590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.244.225 
Dec 27 15:46:04 tuxlinux sshd[13590]: Failed password for invalid user laale from 192.99.244.225 port 38030 ssh2
...
2019-12-28 04:57:29
174.27.176.142 attackbots
tcp 23
2019-12-28 04:54:11
49.88.112.61 attack
detected by Fail2Ban
2019-12-28 05:19:41
62.113.194.88 attack
Fail2Ban Ban Triggered
2019-12-28 05:21:52
185.176.27.254 attack
Port Scanning MultiHost/MultiPort
2019-12-28 05:08:16
112.124.50.81 attackbotsspam
SIP/5060 Probe, BF, Hack -
2019-12-28 04:44:50
122.51.83.60 attackbots
Dec 27 20:33:06 * sshd[24963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.83.60
Dec 27 20:33:08 * sshd[24963]: Failed password for invalid user waz from 122.51.83.60 port 49080 ssh2
2019-12-28 05:08:36

Recently Reported IPs

99.26.231.187 71.187.25.176 22.239.248.149 136.152.94.166
92.225.66.226 141.130.144.74 198.119.65.144 138.137.48.9
193.117.224.44 253.11.63.7 56.154.237.87 163.143.163.31
6.25.35.14 250.121.52.40 37.76.125.52 34.142.141.119
41.90.195.168 212.186.9.72 4.214.34.41 109.119.107.37