Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 223.206.73.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22060
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;223.206.73.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021501 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 05:05:16 CST 2025
;; MSG SIZE  rcvd: 107
Host info
139.73.206.223.in-addr.arpa domain name pointer mx-ll-223.206.73-139.dynamic.3bb.co.th.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.73.206.223.in-addr.arpa	name = mx-ll-223.206.73-139.dynamic.3bb.co.th.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.104.155.137 attackbots
port scan and connect, tcp 80 (http)
2020-02-28 14:43:02
197.185.105.83 attackbotsspam
2020-02-28T06:59:27.383249vps751288.ovh.net sshd\[26361\]: Invalid user webapp from 197.185.105.83 port 35540
2020-02-28T06:59:27.392594vps751288.ovh.net sshd\[26361\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.185.105.83
2020-02-28T06:59:29.958098vps751288.ovh.net sshd\[26361\]: Failed password for invalid user webapp from 197.185.105.83 port 35540 ssh2
2020-02-28T07:00:57.311961vps751288.ovh.net sshd\[26373\]: Invalid user abc from 197.185.105.83 port 44987
2020-02-28T07:00:57.322076vps751288.ovh.net sshd\[26373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.185.105.83
2020-02-28 14:32:28
117.239.78.249 attackbots
Honeypot attack, port: 445, PTR: static.ill.117.239.78.249/24.bsnl.in.
2020-02-28 14:43:57
113.160.202.51 attackspambots
1582865723 - 02/28/2020 05:55:23 Host: 113.160.202.51/113.160.202.51 Port: 445 TCP Blocked
2020-02-28 14:50:58
58.126.201.20 attackbots
Feb 28 06:56:26 h1745522 sshd[7674]: Invalid user gituser from 58.126.201.20 port 36744
Feb 28 06:56:26 h1745522 sshd[7674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.126.201.20
Feb 28 06:56:26 h1745522 sshd[7674]: Invalid user gituser from 58.126.201.20 port 36744
Feb 28 06:56:28 h1745522 sshd[7674]: Failed password for invalid user gituser from 58.126.201.20 port 36744 ssh2
Feb 28 06:58:18 h1745522 sshd[7713]: Invalid user tsuji from 58.126.201.20 port 34858
Feb 28 06:58:18 h1745522 sshd[7713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.126.201.20
Feb 28 06:58:18 h1745522 sshd[7713]: Invalid user tsuji from 58.126.201.20 port 34858
Feb 28 06:58:20 h1745522 sshd[7713]: Failed password for invalid user tsuji from 58.126.201.20 port 34858 ssh2
Feb 28 07:00:15 h1745522 sshd[7784]: Invalid user vps from 58.126.201.20 port 32974
...
2020-02-28 14:51:16
210.165.86.141 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-28 14:56:21
1.9.129.229 attackspambots
Feb 28 01:15:53 plusreed sshd[18225]: Invalid user factory from 1.9.129.229
...
2020-02-28 14:34:56
51.75.246.176 attackspam
Feb 28 07:01:17 server sshd[150602]: Failed password for invalid user lzhou from 51.75.246.176 port 44092 ssh2
Feb 28 07:08:42 server sshd[152078]: Failed password for root from 51.75.246.176 port 58356 ssh2
Feb 28 07:15:54 server sshd[153510]: Failed password for invalid user csserver from 51.75.246.176 port 44434 ssh2
2020-02-28 14:26:49
49.88.112.67 attackbotsspam
Feb 28 07:44:39 eventyay sshd[8379]: Failed password for root from 49.88.112.67 port 49174 ssh2
Feb 28 07:49:11 eventyay sshd[8421]: Failed password for root from 49.88.112.67 port 57239 ssh2
...
2020-02-28 15:07:46
14.29.180.58 attack
Feb 27 20:13:29 web1 sshd\[22250\]: Invalid user ts from 14.29.180.58
Feb 27 20:13:29 web1 sshd\[22250\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.180.58
Feb 27 20:13:31 web1 sshd\[22250\]: Failed password for invalid user ts from 14.29.180.58 port 60497 ssh2
Feb 27 20:21:15 web1 sshd\[22976\]: Invalid user patrycja from 14.29.180.58
Feb 27 20:21:15 web1 sshd\[22976\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.180.58
2020-02-28 14:32:02
170.81.148.7 attackspam
Feb 28 07:09:27 localhost sshd\[31404\]: Invalid user windows from 170.81.148.7
Feb 28 07:09:27 localhost sshd\[31404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.81.148.7
Feb 28 07:09:29 localhost sshd\[31404\]: Failed password for invalid user windows from 170.81.148.7 port 42882 ssh2
Feb 28 07:17:59 localhost sshd\[31808\]: Invalid user prashant from 170.81.148.7
Feb 28 07:17:59 localhost sshd\[31808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.81.148.7
...
2020-02-28 14:27:12
113.109.132.40 attack
B: Magento admin pass test (wrong country)
2020-02-28 14:53:46
222.186.173.238 attack
Unauthorized connection attempt detected from IP address 222.186.173.238 to port 22
2020-02-28 15:11:37
218.250.65.15 attack
Honeypot attack, port: 5555, PTR: n218250065015.netvigator.com.
2020-02-28 15:12:10
171.235.214.8 attackspambots
Automatic report - Port Scan Attack
2020-02-28 14:40:24

Recently Reported IPs

215.252.225.144 8.173.24.221 56.128.232.153 161.248.177.14
187.191.64.12 198.40.72.76 85.56.172.192 166.22.184.87
64.139.10.83 59.102.220.78 230.229.255.178 218.14.238.59
37.218.241.120 77.169.87.151 136.189.153.74 160.100.118.87
41.146.245.236 203.190.175.170 96.93.31.87 221.253.124.207