Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: St. Catharines

Region: Ontario

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.57.21.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17719
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.57.21.46.			IN	A

;; AUTHORITY SECTION:
.			281	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020042702 1800 900 604800 86400

;; Query time: 124 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 28 06:55:28 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 46.21.57.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 46.21.57.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
188.166.144.207 attackspam
Aug  7 03:02:17 web9 sshd\[3283\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.144.207  user=root
Aug  7 03:02:19 web9 sshd\[3283\]: Failed password for root from 188.166.144.207 port 54668 ssh2
Aug  7 03:06:38 web9 sshd\[4124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.144.207  user=root
Aug  7 03:06:40 web9 sshd\[4124\]: Failed password for root from 188.166.144.207 port 37576 ssh2
Aug  7 03:10:56 web9 sshd\[4685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.144.207  user=root
2020-08-07 21:29:55
129.226.117.161 attackspambots
Lines containing failures of 129.226.117.161
Aug  3 16:13:26 linuxrulz sshd[4261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.117.161  user=r.r
Aug  3 16:13:28 linuxrulz sshd[4261]: Failed password for r.r from 129.226.117.161 port 38706 ssh2
Aug  3 16:13:29 linuxrulz sshd[4261]: Received disconnect from 129.226.117.161 port 38706:11: Bye Bye [preauth]
Aug  3 16:13:29 linuxrulz sshd[4261]: Disconnected from authenticating user r.r 129.226.117.161 port 38706 [preauth]
Aug  3 17:00:32 linuxrulz sshd[10384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.117.161  user=r.r
Aug  3 17:00:34 linuxrulz sshd[10384]: Failed password for r.r from 129.226.117.161 port 55568 ssh2
Aug  3 17:00:35 linuxrulz sshd[10384]: Received disconnect from 129.226.117.161 port 55568:11: Bye Bye [preauth]
Aug  3 17:00:35 linuxrulz sshd[10384]: Disconnected from authenticating user r.r 129.226.117.1........
------------------------------
2020-08-07 21:32:05
222.186.30.112 attack
2020-08-07T12:52:05.658005server.espacesoutien.com sshd[27522]: Failed password for root from 222.186.30.112 port 63082 ssh2
2020-08-07T12:52:07.664004server.espacesoutien.com sshd[27522]: Failed password for root from 222.186.30.112 port 63082 ssh2
2020-08-07T12:52:12.753954server.espacesoutien.com sshd[27531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112  user=root
2020-08-07T12:52:14.433997server.espacesoutien.com sshd[27531]: Failed password for root from 222.186.30.112 port 17174 ssh2
...
2020-08-07 21:06:38
138.68.150.93 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-08-07 21:20:56
114.119.161.122 attackbotsspam
Automatic report - Banned IP Access
2020-08-07 21:13:47
211.57.153.250 attackbots
SSH brutforce
2020-08-07 21:34:54
218.92.0.173 attackbotsspam
Aug  7 15:11:12 ns381471 sshd[26975]: Failed password for root from 218.92.0.173 port 25146 ssh2
Aug  7 15:11:15 ns381471 sshd[26975]: Failed password for root from 218.92.0.173 port 25146 ssh2
2020-08-07 21:20:33
207.46.13.45 attack
Automatic report - Banned IP Access
2020-08-07 21:45:25
37.59.56.124 attackbotsspam
37.59.56.124 - - [07/Aug/2020:14:08:01 +0200] "GET /wp-login.php HTTP/1.1" 200 6310 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
37.59.56.124 - - [07/Aug/2020:14:08:02 +0200] "POST /wp-login.php HTTP/1.1" 200 6561 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
37.59.56.124 - - [07/Aug/2020:14:08:03 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-07 21:09:19
202.83.54.167 attackbots
2020-08-07T07:36:50.2656401495-001 sshd[21062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.83.54.167  user=root
2020-08-07T07:36:51.8219191495-001 sshd[21062]: Failed password for root from 202.83.54.167 port 38208 ssh2
2020-08-07T07:41:38.3804811495-001 sshd[21291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.83.54.167  user=root
2020-08-07T07:41:40.1424111495-001 sshd[21291]: Failed password for root from 202.83.54.167 port 48778 ssh2
2020-08-07T07:46:38.6904681495-001 sshd[21431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.83.54.167  user=root
2020-08-07T07:46:40.9693231495-001 sshd[21431]: Failed password for root from 202.83.54.167 port 59344 ssh2
...
2020-08-07 21:31:15
103.219.112.1 attackspambots
Attempted to establish connection to non opened port 17774
2020-08-07 21:05:08
106.13.30.99 attackbotsspam
2020-08-07T14:03:04.532300amanda2.illicoweb.com sshd\[43453\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.30.99  user=root
2020-08-07T14:03:06.503975amanda2.illicoweb.com sshd\[43453\]: Failed password for root from 106.13.30.99 port 59930 ssh2
2020-08-07T14:05:27.781028amanda2.illicoweb.com sshd\[43867\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.30.99  user=root
2020-08-07T14:05:29.049938amanda2.illicoweb.com sshd\[43867\]: Failed password for root from 106.13.30.99 port 39308 ssh2
2020-08-07T14:07:41.497539amanda2.illicoweb.com sshd\[44189\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.30.99  user=root
...
2020-08-07 21:33:15
162.214.28.25 attack
162.214.28.25 - - [07/Aug/2020:14:10:32 +0100] "POST /wp-login.php HTTP/1.1" 200 1908 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
162.214.28.25 - - [07/Aug/2020:14:10:35 +0100] "POST /wp-login.php HTTP/1.1" 200 1839 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
162.214.28.25 - - [07/Aug/2020:14:10:36 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-07 21:35:14
183.82.121.34 attack
Aug  7 14:59:51 piServer sshd[10081]: Failed password for root from 183.82.121.34 port 35200 ssh2
Aug  7 15:03:08 piServer sshd[10348]: Failed password for root from 183.82.121.34 port 51088 ssh2
...
2020-08-07 21:12:20
106.55.148.138 attackspambots
Aug  7 15:07:28 hosting sshd[6493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.55.148.138  user=root
Aug  7 15:07:30 hosting sshd[6493]: Failed password for root from 106.55.148.138 port 41020 ssh2
...
2020-08-07 21:41:58

Recently Reported IPs

39.3.17.97 91.228.14.66 78.244.16.238 223.159.23.191
165.166.235.200 38.141.23.151 65.207.107.111 188.165.236.122
171.225.241.127 174.72.167.231 104.154.173.208 98.247.207.197
219.10.237.126 5.85.204.221 178.238.231.180 100.183.202.36
159.72.244.248 181.136.178.135 76.244.184.165 87.166.2.177