Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 58.39.172.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23935
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;58.39.172.20.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 23:15:28 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 20.172.39.58.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 20.172.39.58.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
210.210.165.45 attackspambots
Telnet/23 MH Probe, BF, Hack -
2019-09-30 22:56:03
222.186.15.110 attack
30.09.2019 15:08:44 SSH access blocked by firewall
2019-09-30 23:12:22
104.42.153.42 attackspam
Sep 30 17:27:14 h2177944 sshd\[28167\]: Invalid user zt from 104.42.153.42 port 7040
Sep 30 17:27:14 h2177944 sshd\[28167\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.42.153.42
Sep 30 17:27:16 h2177944 sshd\[28167\]: Failed password for invalid user zt from 104.42.153.42 port 7040 ssh2
Sep 30 17:31:42 h2177944 sshd\[28435\]: Invalid user Ken from 104.42.153.42 port 7040
Sep 30 17:31:42 h2177944 sshd\[28435\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.42.153.42
...
2019-09-30 23:36:36
82.81.31.9 attackbotsspam
Automatic report - Port Scan Attack
2019-09-30 22:51:25
185.107.44.61 attackbotsspam
3389BruteforceFW22
2019-09-30 23:33:18
85.209.89.205 attackspambots
serial sex offender register as hostname admin/local /racist far right religious group/local men x army lag locks/managed and controlled by a Neo nazis poacher/not farmer -peeping top over fences
2019-09-30 22:52:34
62.4.28.247 attack
Sep 30 05:28:42 auw2 sshd\[8567\]: Invalid user ayesha from 62.4.28.247
Sep 30 05:28:42 auw2 sshd\[8567\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.4.28.247
Sep 30 05:28:45 auw2 sshd\[8567\]: Failed password for invalid user ayesha from 62.4.28.247 port 54900 ssh2
Sep 30 05:32:59 auw2 sshd\[9001\]: Invalid user Samuli from 62.4.28.247
Sep 30 05:32:59 auw2 sshd\[9001\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.4.28.247
2019-09-30 23:37:10
111.230.166.91 attackspambots
Sep 30 12:39:47 vtv3 sshd\[21439\]: Invalid user IBM from 111.230.166.91 port 56908
Sep 30 12:39:47 vtv3 sshd\[21439\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.166.91
Sep 30 12:39:49 vtv3 sshd\[21439\]: Failed password for invalid user IBM from 111.230.166.91 port 56908 ssh2
Sep 30 12:42:37 vtv3 sshd\[23165\]: Invalid user chris from 111.230.166.91 port 53436
Sep 30 12:42:37 vtv3 sshd\[23165\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.166.91
Sep 30 12:54:09 vtv3 sshd\[28822\]: Invalid user lt from 111.230.166.91 port 39568
Sep 30 12:54:09 vtv3 sshd\[28822\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.166.91
Sep 30 12:54:12 vtv3 sshd\[28822\]: Failed password for invalid user lt from 111.230.166.91 port 39568 ssh2
Sep 30 12:57:03 vtv3 sshd\[30633\]: Invalid user pi from 111.230.166.91 port 36108
Sep 30 12:57:03 vtv3 sshd\[30633\]: pam_unix\
2019-09-30 23:02:08
138.94.189.168 attackbotsspam
Sep 30 16:07:59 dedicated sshd[19253]: Invalid user changeme from 138.94.189.168 port 34881
2019-09-30 23:37:40
51.15.1.221 attackspambots
Sep 30 14:29:08 thevastnessof sshd[5705]: Failed password for root from 51.15.1.221 port 34976 ssh2
...
2019-09-30 23:14:22
92.222.216.71 attack
Sep 30 09:58:56 ny01 sshd[30932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.216.71
Sep 30 09:58:58 ny01 sshd[30932]: Failed password for invalid user train from 92.222.216.71 port 33000 ssh2
Sep 30 10:02:46 ny01 sshd[31575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.216.71
2019-09-30 23:23:58
175.124.69.49 attack
23/tcp 23/tcp 23/tcp
[2019-07-31/09-30]3pkt
2019-09-30 23:39:01
219.145.72.255 attackspambots
SSH Brute-Force reported by Fail2Ban
2019-09-30 23:25:58
197.60.14.1 attackspambots
Sep 30 14:15:11 saschabauer sshd[15463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.60.14.1
Sep 30 14:15:14 saschabauer sshd[15463]: Failed password for invalid user admin from 197.60.14.1 port 50048 ssh2
2019-09-30 23:05:32
222.186.42.117 attack
2019-09-30T15:09:24.105444hub.schaetter.us sshd\[5513\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.117  user=root
2019-09-30T15:09:26.088378hub.schaetter.us sshd\[5513\]: Failed password for root from 222.186.42.117 port 35726 ssh2
2019-09-30T15:09:27.906161hub.schaetter.us sshd\[5513\]: Failed password for root from 222.186.42.117 port 35726 ssh2
2019-09-30T15:09:30.338578hub.schaetter.us sshd\[5513\]: Failed password for root from 222.186.42.117 port 35726 ssh2
2019-09-30T15:19:04.957787hub.schaetter.us sshd\[5574\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.117  user=root
...
2019-09-30 23:19:56

Recently Reported IPs

123.190.146.221 196.197.228.171 14.101.34.42 33.3.176.251
164.69.215.74 145.231.19.21 32.203.57.165 139.132.228.42
194.169.176.37 56.15.25.230 177.136.58.188 58.241.160.232
148.161.65.43 57.127.52.124 207.117.189.241 167.76.212.170
180.23.117.176 207.153.199.179 189.42.169.230 157.65.120.153