Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.57.212.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52674
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.57.212.168.			IN	A

;; AUTHORITY SECTION:
.			535	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011001 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 02:28:44 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 168.212.57.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 168.212.57.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
152.170.65.133 attack
(sshd) Failed SSH login from 152.170.65.133 (AR/Argentina/133-65-170-152.fibertel.com.ar): 3 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD
2020-09-29 05:48:26
138.197.66.68 attack
Sep 28 17:31:47 NPSTNNYC01T sshd[1700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.66.68
Sep 28 17:31:49 NPSTNNYC01T sshd[1700]: Failed password for invalid user mysql from 138.197.66.68 port 42160 ssh2
Sep 28 17:35:40 NPSTNNYC01T sshd[1982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.66.68
...
2020-09-29 05:38:45
211.239.124.237 attackspambots
(sshd) Failed SSH login from 211.239.124.237 (KR/South Korea/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 28 16:48:59 server2 sshd[11981]: Invalid user test1 from 211.239.124.237 port 56908
Sep 28 16:49:01 server2 sshd[11981]: Failed password for invalid user test1 from 211.239.124.237 port 56908 ssh2
Sep 28 17:02:48 server2 sshd[14373]: Invalid user pma from 211.239.124.237 port 43836
Sep 28 17:02:50 server2 sshd[14373]: Failed password for invalid user pma from 211.239.124.237 port 43836 ssh2
Sep 28 17:07:15 server2 sshd[15145]: Invalid user odoo from 211.239.124.237 port 53134
2020-09-29 05:14:16
50.192.43.149 attack
Automatic report - Banned IP Access
2020-09-29 05:19:00
222.90.79.50 attackbotsspam
Port Scan
...
2020-09-29 05:25:41
202.184.30.216 attack
2020-09-27 22:03:35 server sshd[25890]: Failed password for invalid user lu from 202.184.30.216 port 33632 ssh2
2020-09-29 05:40:02
193.112.126.64 attack
DATE:2020-09-28 21:53:21, IP:193.112.126.64, PORT:ssh SSH brute force auth (docker-dc)
2020-09-29 05:45:57
61.93.201.198 attackspam
Tried sshing with brute force.
2020-09-29 05:42:35
45.95.168.152 attackbotsspam
Sep 27 16:46:45 lanister sshd[29907]: Invalid user 149.154.64.252 from 45.95.168.152
Sep 27 16:46:45 lanister sshd[29907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.95.168.152
Sep 27 16:46:45 lanister sshd[29907]: Invalid user 149.154.64.252 from 45.95.168.152
Sep 27 16:46:47 lanister sshd[29907]: Failed password for invalid user 149.154.64.252 from 45.95.168.152 port 54196 ssh2
2020-09-29 05:37:03
59.56.95.62 attack
Sep 27 23:29:16 pkdns2 sshd\[44614\]: Invalid user ts3 from 59.56.95.62Sep 27 23:29:19 pkdns2 sshd\[44614\]: Failed password for invalid user ts3 from 59.56.95.62 port 14023 ssh2Sep 27 23:32:22 pkdns2 sshd\[44798\]: Invalid user css from 59.56.95.62Sep 27 23:32:25 pkdns2 sshd\[44798\]: Failed password for invalid user css from 59.56.95.62 port 15244 ssh2Sep 27 23:38:41 pkdns2 sshd\[45171\]: Invalid user ftpuser1 from 59.56.95.62Sep 27 23:38:43 pkdns2 sshd\[45171\]: Failed password for invalid user ftpuser1 from 59.56.95.62 port 13564 ssh2
...
2020-09-29 05:49:07
148.70.33.136 attackspambots
Sep 28 23:14:42 vps333114 sshd[3071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.33.136
Sep 28 23:14:44 vps333114 sshd[3071]: Failed password for invalid user sysadmin from 148.70.33.136 port 43158 ssh2
...
2020-09-29 05:30:34
106.75.67.6 attackbots
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.67.6 
Failed password for invalid user db2inst1 from 106.75.67.6 port 41050 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.67.6
2020-09-29 05:27:57
39.109.115.153 attackspambots
Invalid user redhat from 39.109.115.153 port 55226
2020-09-29 05:37:35
162.243.237.90 attackspambots
Invalid user cssserver from 162.243.237.90 port 41265
2020-09-29 05:44:16
183.82.34.246 attackspambots
Time:     Sun Sep 27 14:55:39 2020 +0000
IP:       183.82.34.246 (IN/India/broadband.actcorp.in)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 27 14:43:47 3 sshd[18307]: Invalid user glassfish from 183.82.34.246 port 39298
Sep 27 14:43:49 3 sshd[18307]: Failed password for invalid user glassfish from 183.82.34.246 port 39298 ssh2
Sep 27 14:46:45 3 sshd[30525]: Invalid user ivan from 183.82.34.246 port 42928
Sep 27 14:46:47 3 sshd[30525]: Failed password for invalid user ivan from 183.82.34.246 port 42928 ssh2
Sep 27 14:55:31 3 sshd[23827]: Invalid user student1 from 183.82.34.246 port 53820
2020-09-29 05:27:34

Recently Reported IPs

18.119.158.124 144.216.43.170 221.147.166.143 101.13.98.46
114.85.46.137 101.168.177.233 178.229.11.238 135.101.160.169
18.229.99.220 152.229.89.160 231.158.69.8 160.181.8.195
138.202.232.120 156.146.41.193 152.32.164.20 152.4.182.91
198.21.203.216 223.130.197.203 126.220.102.168 206.220.127.54