Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Taipei

Region: Taipei City

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: Data Communication Business Group

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.163.139.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16899
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;118.163.139.57.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019072001 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jul 21 03:01:38 CST 2019
;; MSG SIZE  rcvd: 118
Host info
57.139.163.118.in-addr.arpa domain name pointer 118-163-139-57.HINET-IP.hinet.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
57.139.163.118.in-addr.arpa	name = 118-163-139-57.HINET-IP.hinet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
182.112.99.132 attackbots
Telnet/23 MH Probe, BF, Hack -
2019-10-01 01:54:09
222.186.175.183 attackspam
Sep 30 20:11:55 MK-Soft-Root1 sshd[21975]: Failed password for root from 222.186.175.183 port 29362 ssh2
Sep 30 20:12:00 MK-Soft-Root1 sshd[21975]: Failed password for root from 222.186.175.183 port 29362 ssh2
...
2019-10-01 02:13:28
52.231.153.23 attack
2019-09-30T18:15:17.994704abusebot-5.cloudsearch.cf sshd\[6735\]: Invalid user administrator from 52.231.153.23 port 57378
2019-10-01 02:28:36
164.132.209.242 attack
Sep 30 17:57:33 game-panel sshd[19075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.209.242
Sep 30 17:57:34 game-panel sshd[19075]: Failed password for invalid user ubuntu from 164.132.209.242 port 51368 ssh2
Sep 30 18:01:26 game-panel sshd[19239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.209.242
2019-10-01 02:01:32
91.233.172.66 attackspambots
Sep 30 13:26:49 plusreed sshd[5682]: Invalid user kj from 91.233.172.66
...
2019-10-01 02:02:31
181.114.151.176 attack
Telnet/23 MH Probe, BF, Hack -
2019-10-01 01:57:19
5.182.210.128 attackspambots
Sep 30 14:48:41 hcbbdb sshd\[13890\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.182.210.128  user=root
Sep 30 14:48:43 hcbbdb sshd\[13890\]: Failed password for root from 5.182.210.128 port 58360 ssh2
Sep 30 14:55:17 hcbbdb sshd\[14606\]: Invalid user xk from 5.182.210.128
Sep 30 14:55:17 hcbbdb sshd\[14606\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.182.210.128
Sep 30 14:55:19 hcbbdb sshd\[14606\]: Failed password for invalid user xk from 5.182.210.128 port 42748 ssh2
2019-10-01 01:56:35
202.73.9.76 attack
Sep 30 15:54:41 dedicated sshd[17603]: Invalid user colton from 202.73.9.76 port 60641
2019-10-01 02:07:55
94.177.255.218 attackspambots
RDP brute force attack detected by fail2ban
2019-10-01 02:26:53
211.243.236.21 attackbots
Sep 30 14:11:48 ncomp sshd[20013]: Invalid user pi from 211.243.236.21
Sep 30 14:11:48 ncomp sshd[20014]: Invalid user pi from 211.243.236.21
2019-10-01 02:37:49
49.235.173.155 attack
Sep 30 13:48:43 eola sshd[5873]: Invalid user user from 49.235.173.155 port 59296
Sep 30 13:48:43 eola sshd[5873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.173.155 
Sep 30 13:48:45 eola sshd[5873]: Failed password for invalid user user from 49.235.173.155 port 59296 ssh2
Sep 30 13:48:46 eola sshd[5873]: Received disconnect from 49.235.173.155 port 59296:11: Bye Bye [preauth]
Sep 30 13:48:46 eola sshd[5873]: Disconnected from 49.235.173.155 port 59296 [preauth]
Sep 30 13:58:08 eola sshd[6033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.173.155  user=r.r
Sep 30 13:58:10 eola sshd[6033]: Failed password for r.r from 49.235.173.155 port 58134 ssh2
Sep 30 13:58:10 eola sshd[6033]: Received disconnect from 49.235.173.155 port 58134:11: Bye Bye [preauth]
Sep 30 13:58:10 eola sshd[6033]: Disconnected from 49.235.173.155 port 58134 [preauth]


........
-----------------------------------------------
https://www.bl
2019-10-01 02:37:30
177.72.130.239 attack
Telnet/23 MH Probe, BF, Hack -
2019-10-01 02:25:44
103.119.45.147 attack
SASL Brute Force
2019-10-01 02:30:35
1.193.56.148 attack
Automated reporting of FTP Brute Force
2019-10-01 02:27:31
60.221.255.176 attackspam
Sep 30 15:35:57 ns41 sshd[8873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.221.255.176
2019-10-01 02:00:53

Recently Reported IPs

201.247.58.10 71.229.127.62 73.38.235.16 80.123.153.241
190.211.137.22 210.13.13.151 70.11.84.90 196.218.129.139
186.144.97.15 49.164.249.212 3.206.234.61 63.174.197.235
39.20.89.215 1.30.172.171 191.102.91.82 45.33.195.215
85.180.87.243 211.187.148.73 95.129.150.169 162.23.221.125