Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 222.139.51.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26666
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;222.139.51.130.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021801 1800 900 604800 86400

;; Query time: 47 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 02:13:59 CST 2022
;; MSG SIZE  rcvd: 107
Host info
130.51.139.222.in-addr.arpa domain name pointer hn.kd.ny.adsl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
130.51.139.222.in-addr.arpa	name = hn.kd.ny.adsl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
68.183.51.39 attackspam
Sep  6 18:28:55 microserver sshd[62904]: Invalid user csgoserver from 68.183.51.39 port 56206
Sep  6 18:28:55 microserver sshd[62904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.51.39
Sep  6 18:28:57 microserver sshd[62904]: Failed password for invalid user csgoserver from 68.183.51.39 port 56206 ssh2
Sep  6 18:33:10 microserver sshd[63512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.51.39  user=root
Sep  6 18:33:13 microserver sshd[63512]: Failed password for root from 68.183.51.39 port 53580 ssh2
Sep  6 18:45:37 microserver sshd[65364]: Invalid user admin from 68.183.51.39 port 44604
Sep  6 18:45:37 microserver sshd[65364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.51.39
Sep  6 18:45:39 microserver sshd[65364]: Failed password for invalid user admin from 68.183.51.39 port 44604 ssh2
Sep  6 18:49:52 microserver sshd[324]: Invalid user testtest from 68.18
2019-09-07 00:00:42
113.247.75.116 attackbotsspam
Sep  6 18:35:17 taivassalofi sshd[242549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.247.75.116
Sep  6 18:35:19 taivassalofi sshd[242549]: Failed password for invalid user user1 from 113.247.75.116 port 17866 ssh2
...
2019-09-06 23:50:14
109.242.54.127 attack
SSH-bruteforce attempts
2019-09-07 00:20:51
157.230.112.101 attackspam
Detected by ModSecurity. Request URI: /wp-login.php
2019-09-06 23:53:54
164.132.54.215 attack
Sep  6 18:25:27 mail sshd\[16720\]: Invalid user upload@123 from 164.132.54.215 port 39030
Sep  6 18:25:27 mail sshd\[16720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.54.215
Sep  6 18:25:30 mail sshd\[16720\]: Failed password for invalid user upload@123 from 164.132.54.215 port 39030 ssh2
Sep  6 18:29:43 mail sshd\[17137\]: Invalid user 111111 from 164.132.54.215 port 54304
Sep  6 18:29:43 mail sshd\[17137\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.54.215
2019-09-07 00:41:04
202.79.171.175 attackbotsspam
Unauthorized connection attempt from IP address 202.79.171.175 on Port 445(SMB)
2019-09-07 00:05:14
51.83.42.244 attackbots
Sep  6 17:10:51 SilenceServices sshd[28899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.42.244
Sep  6 17:10:53 SilenceServices sshd[28899]: Failed password for invalid user user from 51.83.42.244 port 37942 ssh2
Sep  6 17:14:30 SilenceServices sshd[30237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.42.244
2019-09-06 23:28:31
52.179.180.63 attackspam
Sep  6 18:15:42 icinga sshd[6892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.179.180.63
Sep  6 18:15:44 icinga sshd[6892]: Failed password for invalid user git from 52.179.180.63 port 45232 ssh2
...
2019-09-07 00:17:23
114.134.189.93 attack
TCP Port: 25 _    invalid blocked dnsbl-sorbs abuseat-org _  _  _ _ (1332)
2019-09-06 22:58:21
159.65.185.225 attackspam
Sep  6 04:25:02 tdfoods sshd\[16005\]: Invalid user pms from 159.65.185.225
Sep  6 04:25:02 tdfoods sshd\[16005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.185.225
Sep  6 04:25:04 tdfoods sshd\[16005\]: Failed password for invalid user pms from 159.65.185.225 port 38922 ssh2
Sep  6 04:29:31 tdfoods sshd\[16408\]: Invalid user valerie from 159.65.185.225
Sep  6 04:29:31 tdfoods sshd\[16408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.185.225
2019-09-06 23:02:24
36.156.24.79 attackbotsspam
Sep  6 17:00:28 legacy sshd[1989]: Failed password for root from 36.156.24.79 port 42304 ssh2
Sep  6 17:00:31 legacy sshd[1989]: Failed password for root from 36.156.24.79 port 42304 ssh2
Sep  6 17:00:33 legacy sshd[1989]: Failed password for root from 36.156.24.79 port 42304 ssh2
...
2019-09-06 23:09:03
172.96.191.4 attackbotsspam
xmlrpc attack
2019-09-07 00:02:35
218.92.0.188 attackbotsspam
port scan and connect, tcp 22 (ssh)
2019-09-07 00:08:38
112.85.42.232 attack
sep 06 17:16:19 sshd[2314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.232  user=root
sep 06 17:16:22 sshd[2314]: Failed password for root from 112.85.42.232 port 53257 ssh2
sep 06 17:16:22 dhcpcd[447]: eth0: Router Advertisement from fe80::fa8e:85ff:fede:826a
sep 06 17:16:25 sshd[2314]: Failed password for root from 112.85.42.232 port 53257 ssh2
sep 06 17:16:29 sshd[2314]: Failed password for root from 112.85.42.232 port 53257 ssh2
sep 06 17:16:31 sshd[2314]: Received disconnect from 112.85.42.232 port 53257:11:  [preauth]
sep 06 17:16:31 sshd[2314]: Disconnected from authenticating user root 112.85.42.232 port 53257 [preauth]
sep 06 17:16:31 sshd[2314]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.232  user=root
2019-09-06 23:19:54
37.10.112.73 attack
Sep  6 17:35:01 lnxmysql61 sshd[16628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.10.112.73
2019-09-06 23:53:19

Recently Reported IPs

222.139.32.38 222.139.32.195 222.139.33.30 222.139.60.13
222.139.65.24 222.139.53.118 222.139.64.104 222.139.78.126
222.139.90.49 222.139.96.215 222.140.133.197 222.139.68.228
222.140.138.180 222.140.139.148 222.140.142.69 222.140.157.193
222.140.159.35 222.140.141.158 222.140.161.212 222.140.170.252