Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 222.139.50.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7560
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;222.139.50.8.			IN	A

;; AUTHORITY SECTION:
.			219	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 08:22:24 CST 2022
;; MSG SIZE  rcvd: 105
Host info
8.50.139.222.in-addr.arpa domain name pointer hn.kd.ny.adsl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
8.50.139.222.in-addr.arpa	name = hn.kd.ny.adsl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
88.249.24.162 attackspambots
19/7/20@07:32:54: FAIL: IoT-Telnet address from=88.249.24.162
...
2019-07-21 04:54:57
164.132.104.58 attackspam
Jul 20 22:29:27 SilenceServices sshd[11789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.104.58
Jul 20 22:29:29 SilenceServices sshd[11789]: Failed password for invalid user printer from 164.132.104.58 port 42906 ssh2
Jul 20 22:33:40 SilenceServices sshd[14027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.104.58
2019-07-21 04:54:06
103.35.197.59 attackspambots
SMB Server BruteForce Attack
2019-07-21 05:35:42
180.151.3.103 attack
Jul 20 23:44:31 yabzik sshd[1418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.151.3.103
Jul 20 23:44:33 yabzik sshd[1418]: Failed password for invalid user www from 180.151.3.103 port 59072 ssh2
Jul 20 23:49:49 yabzik sshd[3488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.151.3.103
2019-07-21 04:51:23
185.143.221.61 attackspam
Jul 20 22:06:24 h2177944 kernel: \[1977306.744980\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.221.61 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=40167 PROTO=TCP SPT=59317 DPT=9463 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul 20 22:18:56 h2177944 kernel: \[1978059.101388\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.221.61 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=28960 PROTO=TCP SPT=59317 DPT=9711 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul 20 22:54:29 h2177944 kernel: \[1980191.268600\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.221.61 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=57695 PROTO=TCP SPT=59317 DPT=9460 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul 20 23:00:34 h2177944 kernel: \[1980556.049212\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.221.61 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=18775 PROTO=TCP SPT=59317 DPT=9550 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul 20 23:05:54 h2177944 kernel: \[1980876.738701\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.221.61 DST=85.214.
2019-07-21 05:06:53
185.81.157.136 attackspam
Unauthorized connection attempt from IP address 185.81.157.136 on Port 445(SMB)
2019-07-21 05:34:17
202.142.81.238 attack
SSH scan ::
2019-07-21 05:08:52
217.112.128.159 attackspam
Spam mails sent to address hacked/leaked from Nexus Mods in July 2013
2019-07-21 05:13:35
176.31.191.173 attack
SSH Brute-Forcing (ownc)
2019-07-21 05:09:43
206.189.190.32 attackbots
Jul 20 16:55:49 vps200512 sshd\[7184\]: Invalid user temp from 206.189.190.32
Jul 20 16:55:49 vps200512 sshd\[7184\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.190.32
Jul 20 16:55:52 vps200512 sshd\[7184\]: Failed password for invalid user temp from 206.189.190.32 port 58458 ssh2
Jul 20 17:00:27 vps200512 sshd\[7264\]: Invalid user guest from 206.189.190.32
Jul 20 17:00:27 vps200512 sshd\[7264\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.190.32
2019-07-21 05:03:14
104.248.56.37 attackspambots
2019-07-20T21:03:53.483650abusebot-7.cloudsearch.cf sshd\[30541\]: Invalid user shirley from 104.248.56.37 port 56782
2019-07-21 05:11:09
45.35.253.247 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2019-07-21 04:57:41
141.98.80.61 attackspam
Jul 20 22:19:33 mail postfix/smtpd\[12077\]: warning: unknown\[141.98.80.61\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul 20 22:49:51 mail postfix/smtpd\[14171\]: warning: unknown\[141.98.80.61\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul 20 22:49:59 mail postfix/smtpd\[14171\]: warning: unknown\[141.98.80.61\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul 20 23:03:32 mail postfix/smtpd\[14411\]: warning: unknown\[141.98.80.61\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-07-21 05:02:22
5.200.71.174 attackspambots
Automatic report - Port Scan Attack
2019-07-21 05:28:09
92.45.114.164 attack
Unauthorized connection attempt from IP address 92.45.114.164 on Port 445(SMB)
2019-07-21 05:37:11

Recently Reported IPs

222.139.35.244 222.139.58.248 222.139.65.85 222.140.104.124
222.139.81.124 222.140.141.174 222.139.65.176 222.140.141.235
222.139.65.71 222.140.168.223 222.140.161.46 222.140.159.227
222.140.169.118 222.140.171.176 222.140.173.100 222.140.189.6
222.140.194.130 222.140.217.59 222.140.212.30 222.140.248.141