Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Beijing

Region: Beijing

Country: China

Internet Service Provider: China Unicom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 221.221.99.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8758
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;221.221.99.139.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 21:15:52 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 139.99.221.221.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.99.221.221.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
203.245.29.159 attack
May 11 05:45:33 server sshd[29129]: Failed password for invalid user css from 203.245.29.159 port 37216 ssh2
May 11 05:50:31 server sshd[32686]: Failed password for invalid user gitadmin from 203.245.29.159 port 44170 ssh2
May 11 05:55:35 server sshd[36527]: Failed password for invalid user conf from 203.245.29.159 port 51186 ssh2
2020-05-11 13:00:23
117.102.108.50 attack
(sshd) Failed SSH login from 117.102.108.50 (ID/Indonesia/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 11 05:55:02 amsweb01 sshd[3350]: Did not receive identification string from 117.102.108.50 port 59118
May 11 05:55:02 amsweb01 sshd[3349]: Did not receive identification string from 117.102.108.50 port 59117
May 11 05:55:15 amsweb01 sshd[3353]: Invalid user user from 117.102.108.50 port 59347
May 11 05:55:15 amsweb01 sshd[3355]: Invalid user user from 117.102.108.50 port 59346
May 11 05:55:18 amsweb01 sshd[3355]: Failed password for invalid user user from 117.102.108.50 port 59346 ssh2
2020-05-11 13:15:35
15.164.214.61 attackspambots
port scan and connect, tcp 23 (telnet)
2020-05-11 12:41:54
202.77.105.100 attack
2020-05-11T04:22:25.257689shield sshd\[28240\]: Invalid user recepcao from 202.77.105.100 port 33802
2020-05-11T04:22:25.261387shield sshd\[28240\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.77.105.100
2020-05-11T04:22:27.611457shield sshd\[28240\]: Failed password for invalid user recepcao from 202.77.105.100 port 33802 ssh2
2020-05-11T04:31:21.114008shield sshd\[30333\]: Invalid user plex from 202.77.105.100 port 40523
2020-05-11T04:31:21.117692shield sshd\[30333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.77.105.100
2020-05-11 13:13:32
203.176.75.1 attackbotsspam
May 11 05:45:30 vps687878 sshd\[9971\]: Failed password for invalid user job from 203.176.75.1 port 55742 ssh2
May 11 05:50:07 vps687878 sshd\[10424\]: Invalid user teamspeak3 from 203.176.75.1 port 48098
May 11 05:50:07 vps687878 sshd\[10424\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.176.75.1
May 11 05:50:08 vps687878 sshd\[10424\]: Failed password for invalid user teamspeak3 from 203.176.75.1 port 48098 ssh2
May 11 05:54:56 vps687878 sshd\[10745\]: Invalid user postgres from 203.176.75.1 port 40456
May 11 05:54:56 vps687878 sshd\[10745\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.176.75.1
...
2020-05-11 13:04:31
87.110.181.30 attackspam
May 11 06:18:16 buvik sshd[28193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.110.181.30
May 11 06:18:18 buvik sshd[28193]: Failed password for invalid user visitor from 87.110.181.30 port 49594 ssh2
May 11 06:22:11 buvik sshd[28713]: Invalid user maniruzzaman from 87.110.181.30
...
2020-05-11 12:44:25
49.73.84.175 attackspambots
May 11 06:32:08 vps sshd[225439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.73.84.175
May 11 06:32:10 vps sshd[225439]: Failed password for invalid user irc from 49.73.84.175 port 59188 ssh2
May 11 06:38:07 vps sshd[251945]: Invalid user git from 49.73.84.175 port 58420
May 11 06:38:07 vps sshd[251945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.73.84.175
May 11 06:38:10 vps sshd[251945]: Failed password for invalid user git from 49.73.84.175 port 58420 ssh2
...
2020-05-11 12:40:40
65.49.224.165 attackbotsspam
Invalid user admin from 65.49.224.165 port 39008
2020-05-11 12:52:05
119.28.178.226 attackspam
SSH login attempts.
2020-05-11 13:16:21
68.183.124.53 attackspambots
May 11 06:18:30 inter-technics sshd[27166]: Invalid user snccsite from 68.183.124.53 port 59244
May 11 06:18:30 inter-technics sshd[27166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.124.53
May 11 06:18:30 inter-technics sshd[27166]: Invalid user snccsite from 68.183.124.53 port 59244
May 11 06:18:32 inter-technics sshd[27166]: Failed password for invalid user snccsite from 68.183.124.53 port 59244 ssh2
May 11 06:21:59 inter-technics sshd[27388]: Invalid user zedorf from 68.183.124.53 port 39176
...
2020-05-11 13:05:57
14.161.43.54 attack
Dovecot Invalid User Login Attempt.
2020-05-11 13:09:34
222.186.190.2 attack
Too many connections or unauthorized access detected from Arctic banned ip
2020-05-11 12:36:07
82.209.209.202 attack
May 11 05:52:32 srv01 sshd[9061]: Invalid user lzj from 82.209.209.202 port 46198
May 11 05:52:32 srv01 sshd[9061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.209.209.202
May 11 05:52:32 srv01 sshd[9061]: Invalid user lzj from 82.209.209.202 port 46198
May 11 05:52:34 srv01 sshd[9061]: Failed password for invalid user lzj from 82.209.209.202 port 46198 ssh2
May 11 05:55:24 srv01 sshd[9172]: Invalid user aquser from 82.209.209.202 port 35136
...
2020-05-11 13:13:14
51.159.0.83 attack
May 11 06:23:52 rotator sshd\[1423\]: Invalid user ubnt from 51.159.0.83May 11 06:23:54 rotator sshd\[1423\]: Failed password for invalid user ubnt from 51.159.0.83 port 43210 ssh2May 11 06:23:55 rotator sshd\[1425\]: Invalid user admin from 51.159.0.83May 11 06:23:57 rotator sshd\[1425\]: Failed password for invalid user admin from 51.159.0.83 port 47068 ssh2May 11 06:24:01 rotator sshd\[1427\]: Failed password for root from 51.159.0.83 port 51534 ssh2May 11 06:24:06 rotator sshd\[1429\]: Invalid user 1234 from 51.159.0.83
...
2020-05-11 12:53:41
221.150.22.210 attack
May 11 06:56:30 sip sshd[207941]: Invalid user shuri from 221.150.22.210 port 59578
May 11 06:56:32 sip sshd[207941]: Failed password for invalid user shuri from 221.150.22.210 port 59578 ssh2
May 11 07:00:38 sip sshd[207982]: Invalid user cinzia from 221.150.22.210 port 39462
...
2020-05-11 13:02:30

Recently Reported IPs

144.201.84.119 248.49.119.77 78.115.245.32 110.37.145.196
204.164.255.244 239.182.206.214 30.228.114.165 246.24.20.147
2.12.27.15 147.146.179.144 138.124.210.64 52.243.151.60
236.240.126.36 77.2.152.206 226.47.247.52 214.54.228.195
216.103.219.239 202.154.95.81 147.241.29.112 238.201.23.142