Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Finland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.157.120.126
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31511
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.157.120.126.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 19:44:18 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 126.120.157.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 126.120.157.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.88.112.55 attackspambots
Dec  8 09:08:44 MK-Soft-VM7 sshd[32580]: Failed password for root from 49.88.112.55 port 38866 ssh2
Dec  8 09:08:48 MK-Soft-VM7 sshd[32580]: Failed password for root from 49.88.112.55 port 38866 ssh2
...
2019-12-08 16:08:59
218.92.0.145 attackspam
Dec  8 09:12:54 vps691689 sshd[22387]: Failed password for root from 218.92.0.145 port 50838 ssh2
Dec  8 09:13:08 vps691689 sshd[22387]: Failed password for root from 218.92.0.145 port 50838 ssh2
Dec  8 09:13:08 vps691689 sshd[22387]: error: maximum authentication attempts exceeded for root from 218.92.0.145 port 50838 ssh2 [preauth]
...
2019-12-08 16:14:35
212.156.136.114 attackbots
Dec  8 13:44:26 areeb-Workstation sshd[4408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.156.136.114 
Dec  8 13:44:28 areeb-Workstation sshd[4408]: Failed password for invalid user kanya from 212.156.136.114 port 42446 ssh2
...
2019-12-08 16:16:34
185.53.88.95 attackspambots
\[2019-12-08 02:19:47\] NOTICE\[2754\] chan_sip.c: Registration from '"130" \' failed for '185.53.88.95:5333' - Wrong password
\[2019-12-08 02:19:47\] SECURITY\[2765\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-12-08T02:19:47.932-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="130",SessionID="0x7f26c6230548",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.95/5333",Challenge="1d32fc78",ReceivedChallenge="1d32fc78",ReceivedHash="c69df3737abe1da95679f1afde8c3d99"
\[2019-12-08 02:19:48\] NOTICE\[2754\] chan_sip.c: Registration from '"130" \' failed for '185.53.88.95:5333' - Wrong password
\[2019-12-08 02:19:48\] SECURITY\[2765\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-12-08T02:19:48.074-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="130",SessionID="0x7f26c40cecf8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.
2019-12-08 16:00:27
51.91.251.20 attackbotsspam
SSH invalid-user multiple login attempts
2019-12-08 15:59:22
218.92.0.206 attack
Dec  8 08:29:49 MK-Soft-Root1 sshd[1113]: Failed password for root from 218.92.0.206 port 26770 ssh2
...
2019-12-08 16:24:51
89.134.126.89 attack
Dec  8 02:41:19 TORMINT sshd\[23100\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.134.126.89  user=root
Dec  8 02:41:22 TORMINT sshd\[23100\]: Failed password for root from 89.134.126.89 port 39232 ssh2
Dec  8 02:46:50 TORMINT sshd\[23628\]: Invalid user com from 89.134.126.89
Dec  8 02:46:50 TORMINT sshd\[23628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.134.126.89
...
2019-12-08 16:04:57
128.199.178.188 attackspambots
SSH bruteforce (Triggered fail2ban)
2019-12-08 16:09:46
103.26.40.143 attackbots
Dec  7 21:50:35 sachi sshd\[3242\]: Invalid user gumaro from 103.26.40.143
Dec  7 21:50:35 sachi sshd\[3242\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.26.40.143
Dec  7 21:50:37 sachi sshd\[3242\]: Failed password for invalid user gumaro from 103.26.40.143 port 44694 ssh2
Dec  7 21:58:15 sachi sshd\[4211\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.26.40.143  user=root
Dec  7 21:58:16 sachi sshd\[4211\]: Failed password for root from 103.26.40.143 port 53500 ssh2
2019-12-08 16:08:30
149.56.141.193 attackspam
Dec  8 07:29:16 srv206 sshd[10636]: Invalid user wwwrun from 149.56.141.193
Dec  8 07:29:16 srv206 sshd[10636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.ip-149-56-141.net
Dec  8 07:29:16 srv206 sshd[10636]: Invalid user wwwrun from 149.56.141.193
Dec  8 07:29:18 srv206 sshd[10636]: Failed password for invalid user wwwrun from 149.56.141.193 port 41330 ssh2
...
2019-12-08 16:07:08
112.85.42.182 attackbotsspam
Dec  8 14:37:19 webhost01 sshd[31601]: Failed password for root from 112.85.42.182 port 7916 ssh2
Dec  8 14:37:33 webhost01 sshd[31601]: Failed password for root from 112.85.42.182 port 7916 ssh2
Dec  8 14:37:33 webhost01 sshd[31601]: error: maximum authentication attempts exceeded for root from 112.85.42.182 port 7916 ssh2 [preauth]
...
2019-12-08 15:50:31
94.179.129.139 attackspam
Dec  8 12:53:41 gw1 sshd[17875]: Failed password for root from 94.179.129.139 port 55288 ssh2
...
2019-12-08 16:04:29
51.38.32.230 attackspambots
SSH invalid-user multiple login attempts
2019-12-08 16:28:03
202.179.103.114 attackspam
Dec  8 03:07:42 TORMINT sshd\[25513\]: Invalid user hadoop123!@\# from 202.179.103.114
Dec  8 03:07:42 TORMINT sshd\[25513\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.179.103.114
Dec  8 03:07:44 TORMINT sshd\[25513\]: Failed password for invalid user hadoop123!@\# from 202.179.103.114 port 42160 ssh2
...
2019-12-08 16:14:56
47.113.18.17 attackbots
Host Scan
2019-12-08 15:57:08

Recently Reported IPs

8.122.38.58 169.75.25.44 172.199.125.21 117.241.144.253
129.24.11.229 251.246.167.24 45.200.112.114 167.179.85.181
178.219.10.171 43.124.244.75 204.132.255.138 230.188.205.27
7.231.158.174 152.3.56.24 117.127.141.203 116.114.142.131
240.158.7.180 85.169.208.226 30.227.147.76 202.195.138.195