Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: Guangdong

Country: China

Internet Service Provider: China Unicom

Hostname: unknown

Organization: China Unicom IP network China169 Guangdong province

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 58.249.154.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40613
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;58.249.154.139.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061900 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 19 16:55:25 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 139.154.249.58.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 139.154.249.58.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
68.183.89.147 attackspambots
Jul 21 07:55:28 v22019038103785759 sshd\[12732\]: Invalid user lat from 68.183.89.147 port 52408
Jul 21 07:55:28 v22019038103785759 sshd\[12732\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.89.147
Jul 21 07:55:30 v22019038103785759 sshd\[12732\]: Failed password for invalid user lat from 68.183.89.147 port 52408 ssh2
Jul 21 08:00:12 v22019038103785759 sshd\[12902\]: Invalid user jenkins from 68.183.89.147 port 39228
Jul 21 08:00:12 v22019038103785759 sshd\[12902\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.89.147
...
2020-07-21 14:31:30
192.241.185.120 attackspambots
malicious Brute-Force reported by https://www.patrick-binder.de
...
2020-07-21 14:01:13
212.70.149.82 attack
2020-07-21T08:18:22.160663www postfix/smtpd[18652]: warning: unknown[212.70.149.82]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-07-21T08:18:49.367117www postfix/smtpd[18652]: warning: unknown[212.70.149.82]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-07-21T08:19:17.051124www postfix/smtpd[18652]: warning: unknown[212.70.149.82]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-21 14:26:17
81.88.49.29 attack
Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools
2020-07-21 14:35:56
122.51.171.165 attackspambots
$f2bV_matches
2020-07-21 14:04:17
109.70.100.28 attackspam
CMS (WordPress or Joomla) login attempt.
2020-07-21 14:27:43
149.56.15.98 attackbotsspam
Invalid user qyw from 149.56.15.98 port 41799
2020-07-21 13:55:46
222.186.15.115 attack
2020-07-21T06:20:01.139393server.espacesoutien.com sshd[31476]: Failed password for root from 222.186.15.115 port 11193 ssh2
2020-07-21T06:20:03.384353server.espacesoutien.com sshd[31476]: Failed password for root from 222.186.15.115 port 11193 ssh2
2020-07-21T06:20:07.480498server.espacesoutien.com sshd[31734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.115  user=root
2020-07-21T06:20:09.264212server.espacesoutien.com sshd[31734]: Failed password for root from 222.186.15.115 port 35360 ssh2
...
2020-07-21 14:20:23
51.75.254.172 attackbots
Invalid user fx from 51.75.254.172 port 41912
2020-07-21 14:32:16
120.70.103.239 attackbots
$f2bV_matches
2020-07-21 14:38:55
43.225.151.142 attackbots
Invalid user jordan from 43.225.151.142 port 44327
2020-07-21 14:23:35
65.49.20.69 attack
Unauthorized connection attempt detected from IP address 65.49.20.69 to port 22
2020-07-21 14:31:51
179.180.141.39 attackbotsspam
port
2020-07-21 14:12:31
117.0.38.19 attackbotsspam
IP 117.0.38.19 attacked honeypot on port: 139 at 7/20/2020 8:55:27 PM
2020-07-21 14:36:14
112.85.42.181 attackbotsspam
[MK-Root1] SSH login failed
2020-07-21 14:21:12

Recently Reported IPs

213.55.108.166 84.137.144.4 155.93.128.58 98.26.73.121
202.97.138.28 85.89.232.15 71.45.201.63 95.27.40.172
219.23.67.118 192.185.176.160 45.7.202.93 210.92.147.6
5.125.85.49 148.167.153.245 128.66.73.135 35.251.90.63
87.97.255.208 112.60.77.159 66.82.89.70 134.209.97.22