Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 222.110.54.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51360
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;222.110.54.139.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062202 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jun 23 12:14:09 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 139.54.110.222.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 139.54.110.222.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
78.171.59.204 attack
Automatic report - Port Scan Attack
2019-08-04 05:14:13
79.137.72.121 attackbotsspam
Aug  3 21:33:44 mail sshd\[16573\]: Invalid user postgres from 79.137.72.121 port 39936
Aug  3 21:33:44 mail sshd\[16573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.72.121
...
2019-08-04 04:37:55
185.110.127.26 attackbots
Aug  3 08:08:18 cac1d2 sshd\[11859\]: Invalid user guohui from 185.110.127.26 port 39701
Aug  3 08:08:18 cac1d2 sshd\[11859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.110.127.26
Aug  3 08:08:21 cac1d2 sshd\[11859\]: Failed password for invalid user guohui from 185.110.127.26 port 39701 ssh2
...
2019-08-04 05:07:41
187.62.152.139 attackbotsspam
dovecot jail - smtp auth [ma]
2019-08-04 04:44:40
201.6.99.139 attackspambots
Aug  3 20:21:30 MK-Soft-VM5 sshd\[22701\]: Invalid user ys from 201.6.99.139 port 40364
Aug  3 20:21:30 MK-Soft-VM5 sshd\[22701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.6.99.139
Aug  3 20:21:32 MK-Soft-VM5 sshd\[22701\]: Failed password for invalid user ys from 201.6.99.139 port 40364 ssh2
...
2019-08-04 04:53:02
165.227.10.163 attackbotsspam
2019-08-03T17:08:01.856929stark.klein-stark.info sshd\[12700\]: Invalid user k from 165.227.10.163 port 42622
2019-08-03T17:08:01.861301stark.klein-stark.info sshd\[12700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.10.163
2019-08-03T17:08:03.964856stark.klein-stark.info sshd\[12700\]: Failed password for invalid user k from 165.227.10.163 port 42622 ssh2
...
2019-08-04 05:16:12
176.43.131.49 attackspambots
2019-08-03T15:08:12.254018abusebot-7.cloudsearch.cf sshd\[16915\]: Invalid user www-data from 176.43.131.49 port 53523
2019-08-04 05:13:01
103.243.252.244 attackbotsspam
Feb 26 23:22:20 motanud sshd\[30319\]: Invalid user bkp from 103.243.252.244 port 55578
Feb 26 23:22:20 motanud sshd\[30319\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.243.252.244
Feb 26 23:22:22 motanud sshd\[30319\]: Failed password for invalid user bkp from 103.243.252.244 port 55578 ssh2
2019-08-04 05:05:40
186.232.14.38 attackspam
Aug  3 17:05:58 xeon postfix/smtpd[8655]: warning: unknown[186.232.14.38]: SASL PLAIN authentication failed: authentication failure
2019-08-04 05:18:53
185.234.219.103 attackbots
Aug  3 22:04:02 mail postfix/smtpd\[32671\]: warning: unknown\[185.234.219.103\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Aug  3 22:11:05 mail postfix/smtpd\[32671\]: warning: unknown\[185.234.219.103\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Aug  3 22:46:29 mail postfix/smtpd\[1707\]: warning: unknown\[185.234.219.103\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Aug  3 22:53:47 mail postfix/smtpd\[1670\]: warning: unknown\[185.234.219.103\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-08-04 05:02:29
40.118.46.159 attackspambots
Aug  3 22:33:29 vps691689 sshd[9234]: Failed password for root from 40.118.46.159 port 37948 ssh2
Aug  3 22:39:22 vps691689 sshd[9264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.118.46.159
...
2019-08-04 04:43:20
35.236.135.112 attackbots
WordPress brute force
2019-08-04 05:11:16
196.182.18.34 attack
196.182.18.34 - - [03/Aug/2019:11:08:01 -0400] "GET /?page=/etc/passwd&action=view&manufacturerID=61&productID=9885&linkID=1673 HTTP/1.1" 200 16429 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; rv:50.0) Gecko/20100101 Firefox/50.0"
...
2019-08-04 05:13:52
144.217.166.59 attack
Aug  3 12:11:19 *** sshd[2141]: Failed password for invalid user debian from 144.217.166.59 port 38520 ssh2
2019-08-04 04:40:00
13.95.8.102 attack
Aug  3 19:05:55 SilenceServices sshd[17662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.95.8.102
Aug  3 19:05:57 SilenceServices sshd[17662]: Failed password for invalid user dulap from 13.95.8.102 port 34010 ssh2
Aug  3 19:10:48 SilenceServices sshd[20352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.95.8.102
2019-08-04 04:50:15

Recently Reported IPs

113.190.254.155 80.82.70.221 112.33.38.252 162.144.110.32
2.0.0.0 2a00:1838:37:191::ceb4 39.120.178.144 178.151.255.26
193.58.235.16 34.194.99.18 116.99.3.205 189.198.134.2
92.39.237.192 194.87.110.192 41.189.244.223 177.23.59.66
222.252.17.62 200.174.146.14 47.100.245.119 194.58.70.215