Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
139.59.145.130 attack
invalid user sym from 139.59.145.130 port 44420 ssh2
2020-07-26 16:35:03
139.59.145.130 attackbotsspam
BF attempts
2020-07-14 16:48:09
139.59.145.130 attackbots
Fail2Ban Ban Triggered
2020-07-11 05:30:25
139.59.145.130 attack
Jul  9 20:21:37 ift sshd\[52234\]: Invalid user bob from 139.59.145.130Jul  9 20:21:39 ift sshd\[52234\]: Failed password for invalid user bob from 139.59.145.130 port 48662 ssh2Jul  9 20:25:04 ift sshd\[52799\]: Invalid user jingkang from 139.59.145.130Jul  9 20:25:06 ift sshd\[52799\]: Failed password for invalid user jingkang from 139.59.145.130 port 45486 ssh2Jul  9 20:28:32 ift sshd\[53391\]: Invalid user carha from 139.59.145.130
...
2020-07-10 01:47:23
139.59.145.130 attackbots
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-07-05 19:06:19
139.59.145.130 attack
Jun 29 00:01:01 ip-172-31-61-156 sshd[14224]: Invalid user deploy from 139.59.145.130
Jun 29 00:01:01 ip-172-31-61-156 sshd[14224]: Invalid user deploy from 139.59.145.130
Jun 29 00:01:01 ip-172-31-61-156 sshd[14224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.145.130
Jun 29 00:01:01 ip-172-31-61-156 sshd[14224]: Invalid user deploy from 139.59.145.130
Jun 29 00:01:03 ip-172-31-61-156 sshd[14224]: Failed password for invalid user deploy from 139.59.145.130 port 38738 ssh2
...
2020-06-29 08:20:33
139.59.145.130 attackspambots
160. On Jun 10 2020 experienced a Brute Force SSH login attempt -> 1 unique times by 139.59.145.130.
2020-06-11 08:35:54
139.59.145.130 attackspambots
Invalid user cxzhou from 139.59.145.130 port 53572
2020-05-23 19:55:11
139.59.145.130 attackspam
Invalid user cxzhou from 139.59.145.130 port 53572
2020-05-20 21:07:42
139.59.145.130 attack
May 15 17:44:58 mockhub sshd[18509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.145.130
May 15 17:45:00 mockhub sshd[18509]: Failed password for invalid user aws from 139.59.145.130 port 39192 ssh2
...
2020-05-16 14:30:33
139.59.145.130 attackspam
Auto Fail2Ban report, multiple SSH login attempts.
2020-05-13 23:29:57
139.59.145.153 attackspam
Aug  8 19:39:18 OPSO sshd\[15784\]: Invalid user captain from 139.59.145.153 port 60490
Aug  8 19:39:18 OPSO sshd\[15784\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.145.153
Aug  8 19:39:20 OPSO sshd\[15784\]: Failed password for invalid user captain from 139.59.145.153 port 60490 ssh2
Aug  8 19:43:15 OPSO sshd\[16319\]: Invalid user insurgency from 139.59.145.153 port 52828
Aug  8 19:43:15 OPSO sshd\[16319\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.145.153
2019-08-09 03:21:59
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.59.145.47
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60129
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.59.145.47.			IN	A

;; AUTHORITY SECTION:
.			115	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:04:40 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 47.145.59.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 47.145.59.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.92.1.142 attackspam
Jul 22 23:25:06 TORMINT sshd\[7515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.1.142  user=root
Jul 22 23:25:08 TORMINT sshd\[7515\]: Failed password for root from 218.92.1.142 port 49112 ssh2
Jul 22 23:28:24 TORMINT sshd\[7663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.1.142  user=root
...
2019-07-23 13:21:14
119.196.83.14 attackspam
Automated report - ssh fail2ban:
Jul 23 03:40:33 authentication failure 
Jul 23 03:40:35 wrong password, user=ranjit, port=60470, ssh2
Jul 23 04:27:14 authentication failure
2019-07-23 13:30:10
209.17.96.226 attack
Port scan: Attack repeated for 24 hours
2019-07-23 13:14:39
95.169.31.28 attackspam
login attempts
2019-07-23 13:17:30
77.54.169.192 attackspam
SSH/22 MH Probe, BF, Hack -
2019-07-23 13:16:38
45.124.86.65 attackbotsspam
Jul 23 06:24:17 mail sshd\[9831\]: Invalid user ca from 45.124.86.65 port 36174
Jul 23 06:24:17 mail sshd\[9831\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.124.86.65
Jul 23 06:24:20 mail sshd\[9831\]: Failed password for invalid user ca from 45.124.86.65 port 36174 ssh2
Jul 23 06:30:03 mail sshd\[10849\]: Invalid user administrador from 45.124.86.65 port 60576
Jul 23 06:30:03 mail sshd\[10849\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.124.86.65
2019-07-23 12:36:11
103.21.142.12 attackbotsspam
Automatic report - Banned IP Access
2019-07-23 13:13:21
134.175.118.68 attackspam
Automatic report - Banned IP Access
2019-07-23 13:22:35
61.81.157.75 attackbots
port scan and connect, tcp 23 (telnet)
2019-07-23 13:14:03
218.16.61.217 attackspambots
NOQUEUE: reject: RCPT from unknown\[218.16.61.217\]: 554 5.7.1 Service unavailable\; host \[218.16.61.217\] blocked using sbl-xbl.spamhaus.org\; https://www.spamhaus.org/sbl/query/SBLCSS
2019-07-23 13:02:06
34.252.101.195 attackbotsspam
(From team@bark.com) Hi,

Cj has just asked us to help them find a quality Personal Trainer in Briarwood, Georgia.

We’re now contacting local professionals on their behalf, and if you respond quickly there’s a strong chance you’ll secure the business. It’s free to do so, and there’s no obligation to continue using our service in future.

A maximum of 5 professionals can contact Cj, so be quick!

Take a look at Cj’s request below and, if you can help, click the following link to contact them directly.

Contact Cj now: https://www.bark.com/find-work/the-united-states/briarwood-georgia/personal-trainers/c169516f/p27471086/
                   
Client details:

Cj
Personal Trainers - Briarwood, Georgia
Cj has made their phone number available. We will make it available to you when you send your first message.

Project details:

What is your gender?: Male

What is your age?: 30 - 39 years old

Do you have a preference for the gender of the trainer?: It doesn't matter

How frequently do you want your sessions?: Sev
2019-07-23 12:42:56
128.199.144.99 attack
WordPress login Brute force / Web App Attack on client site.
2019-07-23 13:18:58
46.105.94.103 attack
2019-07-23T04:39:26.660889abusebot-5.cloudsearch.cf sshd\[30377\]: Invalid user danny from 46.105.94.103 port 36092
2019-07-23 12:56:43
140.143.223.242 attack
Jul 23 06:09:20 localhost sshd\[28581\]: Invalid user pub from 140.143.223.242 port 56892
Jul 23 06:09:20 localhost sshd\[28581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.223.242
...
2019-07-23 13:24:07
36.67.106.109 attackbotsspam
Jul 23 06:58:13 s64-1 sshd[25915]: Failed password for root from 36.67.106.109 port 59849 ssh2
Jul 23 07:03:40 s64-1 sshd[26014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.67.106.109
Jul 23 07:03:42 s64-1 sshd[26014]: Failed password for invalid user ian from 36.67.106.109 port 54393 ssh2
...
2019-07-23 13:19:53

Recently Reported IPs

139.59.140.244 139.59.137.242 139.59.148.242 139.59.15.184
139.59.152.46 139.59.152.203 139.59.15.228 139.59.156.46
139.59.158.136 139.59.157.181 139.59.16.188 139.59.16.111
139.59.16.40 139.59.161.208 139.59.161.105 139.59.162.148
139.59.164.212 139.59.164.210 139.59.168.14 139.59.167.93