Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.102.181.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21059
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.102.181.157.		IN	A

;; AUTHORITY SECTION:
.			274	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032100 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 22 00:57:46 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 157.181.102.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 157.181.102.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.222.211.246 attackspam
Jul 16 13:42:20 relay postfix/smtpd\[21677\]: NOQUEUE: reject: RCPT from unknown\[185.222.211.246\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[185.222.211.2\]\>
Jul 16 13:42:20 relay postfix/smtpd\[21677\]: NOQUEUE: reject: RCPT from unknown\[185.222.211.246\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[185.222.211.2\]\>
Jul 16 13:42:20 relay postfix/smtpd\[21677\]: NOQUEUE: reject: RCPT from unknown\[185.222.211.246\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[185.222.211.2\]\>
Jul 16 13:42:20 relay postfix/smtpd\[21677\]: NOQUEUE: reject: RCPT from unknown\[185.222.211.246\]: 554 5.7.1 \: Relay access denied\; from=\
2019-07-16 20:49:09
14.168.66.223 attackbotsspam
Jul 16 14:14:41 srv-4 sshd\[2893\]: Invalid user admin from 14.168.66.223
Jul 16 14:14:41 srv-4 sshd\[2893\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.168.66.223
Jul 16 14:14:42 srv-4 sshd\[2893\]: Failed password for invalid user admin from 14.168.66.223 port 38279 ssh2
...
2019-07-16 20:21:55
206.189.24.75 attack
Caught in portsentry honeypot
2019-07-16 21:07:05
45.13.39.18 attackspambots
Jul 16 14:01:26 mail postfix/smtpd\[9890\]: warning: unknown\[45.13.39.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul 16 14:31:30 mail postfix/smtpd\[10771\]: warning: unknown\[45.13.39.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul 16 14:32:03 mail postfix/smtpd\[10792\]: warning: unknown\[45.13.39.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul 16 14:32:37 mail postfix/smtpd\[10792\]: warning: unknown\[45.13.39.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-07-16 20:47:48
173.187.81.98 attackspam
Jul 16 07:20:40 aat-srv002 sshd[8498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.187.81.98
Jul 16 07:20:42 aat-srv002 sshd[8498]: Failed password for invalid user testuser from 173.187.81.98 port 46574 ssh2
Jul 16 07:26:03 aat-srv002 sshd[8580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.187.81.98
Jul 16 07:26:04 aat-srv002 sshd[8580]: Failed password for invalid user svetlana from 173.187.81.98 port 46616 ssh2
...
2019-07-16 20:35:37
200.57.73.170 attack
Rude login attack (37 tries in 1d)
2019-07-16 20:48:47
188.254.0.224 attack
SSH Bruteforce Attack
2019-07-16 20:40:03
185.137.111.23 attackbotsspam
Jul 16 14:31:52 relay postfix/smtpd\[31411\]: warning: unknown\[185.137.111.23\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 14:32:11 relay postfix/smtpd\[25482\]: warning: unknown\[185.137.111.23\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 14:32:55 relay postfix/smtpd\[15226\]: warning: unknown\[185.137.111.23\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 14:33:14 relay postfix/smtpd\[25482\]: warning: unknown\[185.137.111.23\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 14:33:57 relay postfix/smtpd\[15226\]: warning: unknown\[185.137.111.23\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-07-16 20:39:20
45.248.133.36 attack
Invalid user login from 45.248.133.36 port 53796
2019-07-16 20:43:03
77.40.62.95 attackspambots
failed_logins
2019-07-16 20:46:10
46.6.2.18 attack
Jul 15 06:15:00 srv1 sshd[15867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.6.2.18  user=r.r
Jul 15 06:15:02 srv1 sshd[15867]: Failed password for r.r from 46.6.2.18 port 47654 ssh2
Jul 15 06:15:04 srv1 sshd[15867]: Failed password for r.r from 46.6.2.18 port 47654 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=46.6.2.18
2019-07-16 20:52:49
36.89.248.125 attackbotsspam
Jul 16 13:16:09 mail sshd\[26924\]: Failed password for invalid user al from 36.89.248.125 port 42500 ssh2
Jul 16 13:36:27 mail sshd\[27250\]: Invalid user kd from 36.89.248.125 port 43360
...
2019-07-16 20:41:38
185.137.111.123 attackbotsspam
SMTP blocked logins 5721. Dates: 15-7-2019 / 16-7-2019
2019-07-16 20:38:27
74.82.47.9 attackspam
1563277730 - 07/16/2019 13:48:50 Host: scan-12a.shadowserver.org/74.82.47.9 Port: 17 UDP Blocked
2019-07-16 20:36:45
36.91.162.10 attackspambots
Jul 16 13:13:43 bouncer sshd\[9093\]: Invalid user admin from 36.91.162.10 port 65303
Jul 16 13:13:43 bouncer sshd\[9093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.91.162.10 
Jul 16 13:13:45 bouncer sshd\[9093\]: Failed password for invalid user admin from 36.91.162.10 port 65303 ssh2
...
2019-07-16 21:08:02

Recently Reported IPs

89.124.71.227 79.17.18.101 251.32.125.97 194.40.178.58
98.215.103.176 109.1.168.85 6.231.128.110 216.115.90.109
123.227.4.189 21.209.176.166 180.229.137.247 200.21.122.247
252.147.62.111 62.166.229.205 241.9.53.78 230.196.50.9
18.108.26.63 127.154.147.244 100.58.80.18 49.76.151.113