Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bengaluru

Region: Karnataka

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
139.59.58.115 attackspam
 TCP (SYN) 139.59.58.115:41161 -> port 16666, len 44
2020-10-04 05:48:16
139.59.58.115 attackspam
Port Scan
...
2020-10-03 13:31:50
139.59.58.115 attackspambots
TCP port : 3259
2020-08-16 20:03:46
139.59.58.155 attackspambots
Jul 23 12:32:28 rush sshd[12842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.58.155
Jul 23 12:32:29 rush sshd[12842]: Failed password for invalid user laurie from 139.59.58.155 port 47078 ssh2
Jul 23 12:39:59 rush sshd[12977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.58.155
...
2020-07-23 20:59:44
139.59.58.115 attackbots
Unauthorized connection attempt detected from IP address 139.59.58.115 to port 10796
2020-07-23 04:04:31
139.59.58.155 attackbotsspam
*Port Scan* detected from 139.59.58.155 (IN/India/Karnataka/Bengaluru/-). 4 hits in the last 125 seconds
2020-07-18 18:20:14
139.59.58.155 attack
" "
2020-07-16 23:53:38
139.59.58.155 attackbotsspam
Jul 15 03:59:32 dignus sshd[26607]: Failed password for invalid user sandy from 139.59.58.155 port 37802 ssh2
Jul 15 04:03:13 dignus sshd[27028]: Invalid user eveline from 139.59.58.155 port 48430
Jul 15 04:03:13 dignus sshd[27028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.58.155
Jul 15 04:03:15 dignus sshd[27028]: Failed password for invalid user eveline from 139.59.58.155 port 48430 ssh2
Jul 15 04:06:39 dignus sshd[27773]: Invalid user alban from 139.59.58.155 port 51902
...
2020-07-15 19:12:07
139.59.58.155 attackspam
firewall-block, port(s): 511/tcp
2020-07-14 04:12:36
139.59.58.155 attackbotsspam
Jul  8 13:49:12 debian-2gb-nbg1-2 kernel: \[16467551.789072\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=139.59.58.155 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=32252 PROTO=TCP SPT=44330 DPT=29651 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-08 20:37:58
139.59.58.155 attack
Jun 30 06:08:10 inter-technics sshd[27345]: Invalid user backups from 139.59.58.155 port 42866
Jun 30 06:08:10 inter-technics sshd[27345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.58.155
Jun 30 06:08:10 inter-technics sshd[27345]: Invalid user backups from 139.59.58.155 port 42866
Jun 30 06:08:12 inter-technics sshd[27345]: Failed password for invalid user backups from 139.59.58.155 port 42866 ssh2
Jun 30 06:14:00 inter-technics sshd[27774]: Invalid user aster from 139.59.58.155 port 43192
...
2020-06-30 12:20:55
139.59.58.155 attackbotsspam
unauthorized connection attempt
2020-06-27 12:50:45
139.59.58.115 attack
Jun 26 20:40:33 ArkNodeAT sshd\[17687\]: Invalid user scs from 139.59.58.115
Jun 26 20:40:33 ArkNodeAT sshd\[17687\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.58.115
Jun 26 20:40:34 ArkNodeAT sshd\[17687\]: Failed password for invalid user scs from 139.59.58.115 port 40836 ssh2
2020-06-27 03:29:06
139.59.58.115 attack
 TCP (SYN) 139.59.58.115:49139 -> port 4755, len 44
2020-06-24 02:04:24
139.59.58.115 attackbotsspam
 TCP (SYN) 139.59.58.115:55217 -> port 4233, len 44
2020-06-23 14:59:18
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#


NetRange:       139.59.0.0 - 139.59.255.255
CIDR:           139.59.0.0/16
NetName:        APNIC-ERX-139-59-0-0
NetHandle:      NET-139-59-0-0-1
Parent:         NET139 (NET-139-0-0-0-0)
NetType:        Early Registrations, Transferred to APNIC
OriginAS:       
Organization:   Asia Pacific Network Information Centre (APNIC)
RegDate:        2004-03-03
Updated:        2009-10-08
Comment:        This IP address range is not registered in the ARIN database.
Comment:        This range was transferred to the APNIC Whois Database as
Comment:        part of the ERX (Early Registration Transfer) project.
Comment:        For details, refer to the APNIC Whois Database via
Comment:        WHOIS.APNIC.NET or http://wq.apnic.net/apnic-bin/whois.pl
Comment:        
Comment:        ** IMPORTANT NOTE: APNIC is the Regional Internet Registry
Comment:        for the Asia Pacific region.  APNIC does not operate networks
Comment:        using this IP address range and is not able to investigate
Comment:        spam or abuse reports relating to these addresses.  For more
Comment:        help, refer to http://www.apnic.net/apnic-info/whois_search2/abuse-and-spamming
Ref:            https://rdap.arin.net/registry/ip/139.59.0.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois.apnic.net


OrgName:        Asia Pacific Network Information Centre
OrgId:          APNIC
Address:        PO Box 3646
City:           South Brisbane
StateProv:      QLD
PostalCode:     4101
Country:        AU
RegDate:        
Updated:        2012-01-24
Ref:            https://rdap.arin.net/registry/entity/APNIC

ReferralServer:  whois://whois.apnic.net
ResourceLink:  https://apps.db.ripe.net/db-web-ui/query

OrgAbuseHandle: AWC12-ARIN
OrgAbuseName:   APNIC Whois Contact
OrgAbusePhone:  +61 7 3858 3188 
OrgAbuseEmail:  search-apnic-not-arin@apnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN

OrgTechHandle: AWC12-ARIN
OrgTechName:   APNIC Whois Contact
OrgTechPhone:  +61 7 3858 3188 
OrgTechEmail:  search-apnic-not-arin@apnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.apnic.net.

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '139.59.56.0 - 139.59.63.255'

% Abuse contact for '139.59.56.0 - 139.59.63.255' is 'abuse@digitalocean.com'

inetnum:        139.59.56.0 - 139.59.63.255
netname:        DIGITALOCEAN-AP
descr:          DigitalOcean, LLC
country:        IN
admin-c:        DOIA2-AP
tech-c:         DOIA2-AP
abuse-c:        AD699-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-DIGITALOCEAN-AP
mnt-irt:        IRT-DIGITALOCEAN-AP
last-modified:  2020-05-31T21:35:26Z
source:         APNIC

irt:            IRT-DIGITALOCEAN-AP
address:        105 Edgeview Drive, Suite 425, Broomfield, Colorado 80021
e-mail:         noc@digitalocean.com
abuse-mailbox:  abuse@digitalocean.com
admin-c:        DOIA2-AP
tech-c:         DOIA2-AP
auth:           # Filtered
remarks:        noc@digitalocean.com was validated on 2025-05-20
remarks:        abuse@digitalocean.com was validated on 2025-08-14
mnt-by:         MAINT-DIGITALOCEAN-AP
last-modified:  2025-09-04T07:01:35Z
source:         APNIC

role:           ABUSE DIGITALOCEANAP
country:        ZZ
address:        105 Edgeview Drive, Suite 425, Broomfield, Colorado 80021
phone:          +000000000
e-mail:         noc@digitalocean.com
admin-c:        DOIA2-AP
tech-c:         DOIA2-AP
nic-hdl:        AD699-AP
remarks:        Generated from irt object IRT-DIGITALOCEAN-AP
remarks:        noc@digitalocean.com was validated on 2025-05-20
remarks:        abuse@digitalocean.com was validated on 2025-08-14
abuse-mailbox:  abuse@digitalocean.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-08-14T13:27:09Z
source:         APNIC

role:           Digital Ocean Inc administrator
address:        105 Edgeview Drive, Suite 425, Broomfield, Colorado 80021
country:        US
phone:          +1 646-827-4366
fax-no:         +1 646-827-4366
e-mail:         abuse@digitalocean.com
admin-c:        DOIA2-AP
tech-c:         DOIA2-AP
nic-hdl:        DOIA2-AP
mnt-by:         MAINT-DIGITALOCEAN-AP
last-modified:  2025-04-11T18:24:27Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.59.58.202
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60016
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.59.58.202.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025110700 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 07 21:00:32 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 202.58.59.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 202.58.59.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
177.73.250.160 attackbots
spam
2020-03-01 18:42:00
80.237.79.29 attackspam
spam
2020-03-01 18:34:20
191.240.28.25 attack
spam
2020-03-01 18:37:31
171.235.160.150 attackbotsspam
spam
2020-03-01 18:24:51
213.80.166.5 attackspambots
spam
2020-03-01 18:21:25
88.118.131.30 attackspam
spam
2020-03-01 18:27:07
200.228.86.78 attackbotsspam
Absender hat Spam-Falle ausgel?st
2020-03-01 18:36:51
52.176.248.236 attack
Invalid user sinus from 52.176.248.236 port 51608
2020-03-01 18:08:21
51.83.98.104 attack
Mar  1 10:39:42 MK-Soft-VM4 sshd[30136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.98.104 
Mar  1 10:39:44 MK-Soft-VM4 sshd[30136]: Failed password for invalid user ftp from 51.83.98.104 port 59244 ssh2
...
2020-03-01 18:07:30
66.76.58.60 attackbotsspam
spam
2020-03-01 18:28:08
51.89.99.120 attack
[portscan] tcp/21 [FTP]
[portscan] tcp/22 [SSH]
[portscan] tcp/23 [TELNET]
[scan/connect: 5 time(s)]
in blocklist.de:'listed [ftp]'
*(RWIN=1024)(03011150)
2020-03-01 18:11:36
77.37.208.119 attack
Absender hat Spam-Falle ausgel?st
2020-03-01 18:27:44
177.130.110.87 attackbotsspam
email spam
2020-03-01 18:41:00
106.104.151.142 attack
spam
2020-03-01 18:46:28
186.148.162.100 attackspam
spam
2020-03-01 18:39:24

Recently Reported IPs

162.243.171.100 91.232.238.153 150.129.80.20 120.233.128.103
37.167.11.87 37.167.11.243 74.7.230.56 74.7.227.91
39.165.79.119 112.4.101.51 106.75.65.180 59.173.133.46
106.75.21.200 40.124.185.213 2409:8a3c:67c8:7287:a424:42b4:6499:a2bb 112.242.235.125
240e:345:676c:c300:d111:bbbc:acf:65ce 2408:8215:671a:1a81:532c:b8f4:9a22:3bcf 2409:8d05:40c:30b:16:e18:7c8b:532d 2409:8a3c:67c8:7287:a424:4264:6499:a2bb