Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Beijing

Region: Beijing

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 39.99.158.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1548
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;39.99.158.214.			IN	A

;; AUTHORITY SECTION:
.			344	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061401 1800 900 604800 86400

;; Query time: 104 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 15 08:26:37 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 214.158.99.39.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 214.158.99.39.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
47.104.85.14 attackspam
47.104.85.14 - - [24/Aug/2020:12:51:34 +0100] "POST /wp-login.php HTTP/1.1" 200 4433 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
47.104.85.14 - - [24/Aug/2020:12:51:38 +0100] "POST /wp-login.php HTTP/1.1" 200 4433 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
47.104.85.14 - - [24/Aug/2020:12:51:40 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-24 22:00:09
39.105.192.221 attack
Aug 24 13:51:07  sshd\[5752\]: User root from 39.105.192.221 not allowed because not listed in AllowUsersAug 24 13:51:09  sshd\[5752\]: Failed password for invalid user root from 39.105.192.221 port 56630 ssh2
...
2020-08-24 22:24:19
178.148.244.66 attackspambots
Automatic report - XMLRPC Attack
2020-08-24 22:24:47
185.220.101.213 attackspambots
detected by Fail2Ban
2020-08-24 22:22:13
187.188.149.151 attack
Aug 24 15:38:23 home sshd[44214]: Invalid user server from 187.188.149.151 port 15454
Aug 24 15:38:23 home sshd[44214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.188.149.151 
Aug 24 15:38:23 home sshd[44214]: Invalid user server from 187.188.149.151 port 15454
Aug 24 15:38:25 home sshd[44214]: Failed password for invalid user server from 187.188.149.151 port 15454 ssh2
Aug 24 15:42:57 home sshd[45736]: Invalid user lzy from 187.188.149.151 port 49195
...
2020-08-24 22:05:37
120.70.101.85 attack
2020-08-24T11:35:50.619389ionos.janbro.de sshd[64431]: Failed password for invalid user sftp_user from 120.70.101.85 port 44306 ssh2
2020-08-24T11:41:07.701768ionos.janbro.de sshd[64449]: Invalid user helena from 120.70.101.85 port 44705
2020-08-24T11:41:07.847512ionos.janbro.de sshd[64449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.101.85
2020-08-24T11:41:07.701768ionos.janbro.de sshd[64449]: Invalid user helena from 120.70.101.85 port 44705
2020-08-24T11:41:10.690063ionos.janbro.de sshd[64449]: Failed password for invalid user helena from 120.70.101.85 port 44705 ssh2
2020-08-24T11:46:02.760776ionos.janbro.de sshd[64454]: Invalid user fax from 120.70.101.85 port 45107
2020-08-24T11:46:02.940797ionos.janbro.de sshd[64454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.101.85
2020-08-24T11:46:02.760776ionos.janbro.de sshd[64454]: Invalid user fax from 120.70.101.85 port 45107
2020-08-2
...
2020-08-24 22:19:34
193.112.143.80 attack
Triggered by Fail2Ban at Ares web server
2020-08-24 21:59:51
190.199.33.226 attackspambots
[N10.H1.VM1] Port Scanner Detected Blocked by UFW
2020-08-24 21:45:02
111.95.224.163 attackbotsspam
Unauthorised access (Aug 24) SRC=111.95.224.163 LEN=44 TTL=54 ID=3947 TCP DPT=23 WINDOW=59399 SYN
2020-08-24 22:13:48
83.97.20.35 attackspambots
firewall-block, port(s): 515/tcp, 902/tcp, 1883/tcp, 2480/tcp, 5678/tcp, 9595/tcp, 10243/tcp
2020-08-24 22:20:58
93.107.187.162 attackspambots
Aug 24 15:03:07 srv-ubuntu-dev3 sshd[99971]: Invalid user galileo from 93.107.187.162
Aug 24 15:03:07 srv-ubuntu-dev3 sshd[99971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.107.187.162
Aug 24 15:03:07 srv-ubuntu-dev3 sshd[99971]: Invalid user galileo from 93.107.187.162
Aug 24 15:03:10 srv-ubuntu-dev3 sshd[99971]: Failed password for invalid user galileo from 93.107.187.162 port 40578 ssh2
Aug 24 15:06:53 srv-ubuntu-dev3 sshd[100397]: Invalid user postgres from 93.107.187.162
Aug 24 15:06:53 srv-ubuntu-dev3 sshd[100397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.107.187.162
Aug 24 15:06:53 srv-ubuntu-dev3 sshd[100397]: Invalid user postgres from 93.107.187.162
Aug 24 15:06:55 srv-ubuntu-dev3 sshd[100397]: Failed password for invalid user postgres from 93.107.187.162 port 48296 ssh2
Aug 24 15:10:51 srv-ubuntu-dev3 sshd[100978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui
...
2020-08-24 22:04:27
188.166.2.68 attackspambots
 TCP (SYN) 188.166.2.68:17515 -> port 22, len 48
2020-08-24 21:44:17
134.209.89.139 attackbotsspam
134.209.89.139 - - [24/Aug/2020:12:51:51 +0100] "POST /wp-login.php HTTP/1.1" 200 2420 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
134.209.89.139 - - [24/Aug/2020:12:51:52 +0100] "POST /wp-login.php HTTP/1.1" 200 2393 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
134.209.89.139 - - [24/Aug/2020:12:51:53 +0100] "POST /wp-login.php HTTP/1.1" 200 2440 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-24 21:49:16
5.188.206.194 attack
Aug 24 15:41:18 relay postfix/smtpd\[5705\]: warning: unknown\[5.188.206.194\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 24 15:41:37 relay postfix/smtpd\[4877\]: warning: unknown\[5.188.206.194\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 24 15:46:21 relay postfix/smtpd\[4892\]: warning: unknown\[5.188.206.194\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 24 15:46:33 relay postfix/smtpd\[4995\]: warning: unknown\[5.188.206.194\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 24 15:50:31 relay postfix/smtpd\[7694\]: warning: unknown\[5.188.206.194\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-24 21:51:21
106.12.210.166 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-08-24 22:01:38

Recently Reported IPs

39.98.126.59 39.99.215.143 39.98.152.63 39.102.138.226
39.103.165.205 179.168.189.200 34.219.109.31 39.103.191.36
39.104.19.16 39.104.22.15 39.104.65.220 39.104.71.1
39.104.88.80 39.104.141.9 39.104.174.36 39.104.156.32
39.104.170.13 39.105.55.133 39.105.152.141 39.105.205.112