Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.205.57.162
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22080
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.205.57.162.			IN	A

;; AUTHORITY SECTION:
.			388	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 10:03:02 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 162.57.205.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 162.57.205.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
203.134.194.101 attack
Automatic report - Port Scan Attack
2019-09-28 03:26:19
222.218.17.189 attackspam
failed_logins
2019-09-28 03:04:50
182.74.217.122 attackspam
Sep 27 16:54:19 lnxded64 sshd[12079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.74.217.122
2019-09-28 03:02:30
5.135.108.140 attackspambots
Automated report - ssh fail2ban:
Sep 27 18:24:09 authentication failure 
Sep 27 18:24:11 wrong password, user=pgbouncer, port=48114, ssh2
Sep 27 18:28:05 authentication failure
2019-09-28 03:02:42
125.227.255.79 attackbots
Sep 27 17:47:18 mail sshd\[18083\]: Failed password for invalid user sv from 125.227.255.79 port 6424 ssh2
Sep 27 17:51:34 mail sshd\[18676\]: Invalid user Administrator from 125.227.255.79 port 45583
Sep 27 17:51:34 mail sshd\[18676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.227.255.79
Sep 27 17:51:36 mail sshd\[18676\]: Failed password for invalid user Administrator from 125.227.255.79 port 45583 ssh2
Sep 27 17:55:53 mail sshd\[19380\]: Invalid user mvts from 125.227.255.79 port 48453
Sep 27 17:55:53 mail sshd\[19380\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.227.255.79
2019-09-28 03:13:26
59.145.221.103 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2019-09-28 03:10:57
58.162.140.172 attack
Sep 27 15:23:57 vps691689 sshd[12819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.162.140.172
Sep 27 15:24:00 vps691689 sshd[12819]: Failed password for invalid user just from 58.162.140.172 port 54290 ssh2
...
2019-09-28 03:24:22
159.203.190.189 attackbots
DATE:2019-09-27 18:44:44,IP:159.203.190.189,MATCHES:10,PORT:ssh
2019-09-28 03:19:04
185.143.221.39 attackspambots
3389/tcp 3389/tcp 3389/tcp...
[2019-07-29/09-27]173pkt,1pt.(tcp)
2019-09-28 02:59:36
195.154.42.220 attackspam
Prolific Spammer!
2019-09-28 03:08:31
51.91.37.197 attack
Sep 27 20:50:27 saschabauer sshd[10445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.37.197
Sep 27 20:50:29 saschabauer sshd[10445]: Failed password for invalid user 123456 from 51.91.37.197 port 40414 ssh2
2019-09-28 03:39:05
92.118.160.25 attackbots
Scanning random ports - tries to find possible vulnerable services
2019-09-28 03:18:02
140.143.53.145 attack
Sep 27 20:43:05 s64-1 sshd[14666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.53.145
Sep 27 20:43:07 s64-1 sshd[14666]: Failed password for invalid user backup1 from 140.143.53.145 port 34782 ssh2
Sep 27 20:47:39 s64-1 sshd[14749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.53.145
...
2019-09-28 03:00:05
106.13.209.94 attackbots
2019-09-27T19:41:47.975588centos sshd\[7098\]: Invalid user sun from 106.13.209.94 port 60102
2019-09-27T19:41:47.981128centos sshd\[7098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.209.94
2019-09-27T19:41:50.160100centos sshd\[7098\]: Failed password for invalid user sun from 106.13.209.94 port 60102 ssh2
2019-09-28 03:16:17
121.128.205.187 attack
Sep 27 12:06:53 sshgateway sshd\[21449\]: Invalid user Alphanetworks from 121.128.205.187
Sep 27 12:06:53 sshgateway sshd\[21449\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.128.205.187
Sep 27 12:06:54 sshgateway sshd\[21449\]: Failed password for invalid user Alphanetworks from 121.128.205.187 port 61351 ssh2
2019-09-28 03:25:35

Recently Reported IPs

139.209.123.228 139.214.216.94 139.205.227.228 139.202.22.115
139.212.195.156 139.214.47.121 139.214.66.206 139.214.68.154
139.216.27.233 139.215.122.198 139.218.207.211 139.28.59.27
139.28.59.150 139.218.49.34 139.227.220.215 139.228.170.77
139.5.248.139 139.47.101.221 139.5.147.152 139.5.222.95