Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
139.59.70.186 attackspam
Oct  5 00:08:17 prox sshd[13002]: Failed password for root from 139.59.70.186 port 52148 ssh2
2020-10-05 07:23:09
139.59.70.186 attackspam
Oct  4 17:18:33 dev0-dcde-rnet sshd[491]: Failed password for root from 139.59.70.186 port 60534 ssh2
Oct  4 17:22:57 dev0-dcde-rnet sshd[685]: Failed password for root from 139.59.70.186 port 39232 ssh2
2020-10-04 23:36:43
139.59.70.186 attackbotsspam
Oct  4 07:24:06 vpn01 sshd[2855]: Failed password for root from 139.59.70.186 port 60498 ssh2
...
2020-10-04 15:20:30
139.59.70.186 attack
" "
2020-09-30 03:34:08
139.59.70.186 attack
Found on   Github Combined on 4 lists    / proto=6  .  srcport=53107  .  dstport=20959  .     (1429)
2020-09-29 19:39:36
139.59.70.186 attackspam
TCP ports : 17670 / 19280
2020-09-11 20:15:29
139.59.70.186 attackbots
Port scan: Attack repeated for 24 hours
2020-09-11 12:21:33
139.59.70.186 attackbotsspam
Found on   Github Combined on 4 lists    / proto=6  .  srcport=50997  .  dstport=17670  .     (807)
2020-09-11 04:42:02
139.59.70.186 attackbots
 TCP (SYN) 139.59.70.186:53867 -> port 379, len 44
2020-08-30 18:06:52
139.59.70.186 attack
Invalid user www from 139.59.70.186 port 45566
2020-08-29 18:38:29
139.59.70.186 attackbotsspam
2020-08-26T09:20:06.321365centos sshd[11287]: Invalid user aldo from 139.59.70.186 port 57280
2020-08-26T09:20:08.272485centos sshd[11287]: Failed password for invalid user aldo from 139.59.70.186 port 57280 ssh2
2020-08-26T09:27:20.705032centos sshd[11704]: Invalid user pierre from 139.59.70.186 port 56014
...
2020-08-26 17:56:15
139.59.70.186 attackbotsspam
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-08-26 07:10:20
139.59.70.186 attackbots
Port scan denied
2020-08-25 14:15:10
139.59.70.186 attackspam
Multiple SSH authentication failures from 139.59.70.186
2020-08-17 12:59:32
139.59.70.186 attackspam
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-16T18:04:16Z and 2020-08-16T18:15:01Z
2020-08-17 03:44:55
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.59.70.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45194
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.59.70.49.			IN	A

;; AUTHORITY SECTION:
.			248	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022033100 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 01 00:31:46 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 49.70.59.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 49.70.59.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
118.27.31.188 attack
2019-10-23T14:36:50.815886hub.schaetter.us sshd\[11563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v118-27-31-188.hkbx.static.cnode.io  user=root
2019-10-23T14:36:53.199002hub.schaetter.us sshd\[11563\]: Failed password for root from 118.27.31.188 port 33262 ssh2
2019-10-23T14:41:26.630014hub.schaetter.us sshd\[11586\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v118-27-31-188.hkbx.static.cnode.io  user=root
2019-10-23T14:41:28.902245hub.schaetter.us sshd\[11586\]: Failed password for root from 118.27.31.188 port 45646 ssh2
2019-10-23T14:45:59.274376hub.schaetter.us sshd\[11607\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v118-27-31-188.hkbx.static.cnode.io  user=root
...
2019-10-23 23:27:02
198.108.66.121 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-23 23:48:08
198.100.159.86 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-23 23:44:49
40.120.48.155 attack
Oct 23 13:38:59 tor-proxy-06 sshd\[28302\]: Invalid user professor from 40.120.48.155 port 45560
Oct 23 13:42:36 tor-proxy-06 sshd\[28319\]: Invalid user gitlab from 40.120.48.155 port 40692
Oct 23 13:46:04 tor-proxy-06 sshd\[28372\]: User root from 40.120.48.155 not allowed because not listed in AllowUsers
...
2019-10-23 23:37:26
58.64.185.104 attackspambots
2019-10-23T15:22:08.146494abusebot-6.cloudsearch.cf sshd\[11887\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.64.185.104  user=root
2019-10-24 00:07:40
45.136.110.40 attackbots
Oct 23 15:39:17   TCP Attack: SRC=45.136.110.40 DST=[Masked] LEN=40 TOS=0x08 PREC=0x20 TTL=240  PROTO=TCP SPT=58222 DPT=10777 WINDOW=1024 RES=0x00 SYN URGP=0
2019-10-24 00:09:34
47.22.135.70 attackbotsspam
Oct 23 17:04:06 nginx sshd[84950]: Connection from 47.22.135.70 port 40634 on 10.23.102.80 port 22
Oct 23 17:04:07 nginx sshd[84950]: Connection closed by 47.22.135.70 port 40634 [preauth]
2019-10-23 23:38:37
165.22.130.168 attackspam
Oct 21 06:49:43 nirvana postfix/smtpd[14164]: connect from unknown[165.22.130.168]
Oct 21 06:49:44 nirvana postfix/smtpd[14164]: warning: unknown[165.22.130.168]: SASL LOGIN authentication failed: authentication failure
Oct 21 06:49:44 nirvana postfix/smtpd[14164]: disconnect from unknown[165.22.130.168]
Oct 21 06:55:21 nirvana postfix/smtpd[21609]: connect from unknown[165.22.130.168]
Oct 21 06:55:22 nirvana postfix/smtpd[21609]: warning: unknown[165.22.130.168]: SASL LOGIN authentication failed: authentication failure
Oct 21 06:55:22 nirvana postfix/smtpd[21609]: disconnect from unknown[165.22.130.168]
Oct 21 06:56:35 nirvana postfix/smtpd[21609]: connect from unknown[165.22.130.168]
Oct 21 06:56:36 nirvana postfix/smtpd[21609]: warning: unknown[165.22.130.168]: SASL LOGIN authentication failed: authentication failure
Oct 21 06:56:36 nirvana postfix/smtpd[21609]: disconnect from unknown[165.22.130.168]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=165.22
2019-10-23 23:49:35
36.66.156.125 attackspambots
Oct 23 16:30:55 vpn01 sshd[982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.66.156.125
Oct 23 16:30:57 vpn01 sshd[982]: Failed password for invalid user postgres from 36.66.156.125 port 35412 ssh2
...
2019-10-23 23:32:50
114.33.155.131 attackbotsspam
Port Scan
2019-10-23 23:40:44
92.63.194.115 attackspambots
10/23/2019-15:33:26.343745 92.63.194.115 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-23 23:31:45
198.108.66.180 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-23 23:57:40
196.52.43.63 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-23 23:28:26
31.163.175.238 attack
Chat Spam
2019-10-24 00:10:02
62.234.94.46 attackspam
Oct 21 09:05:52 nbi-636 sshd[1052]: User r.r from 62.234.94.46 not allowed because not listed in AllowUsers
Oct 21 09:05:52 nbi-636 sshd[1052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.94.46  user=r.r
Oct 21 09:05:54 nbi-636 sshd[1052]: Failed password for invalid user r.r from 62.234.94.46 port 40160 ssh2
Oct 21 09:05:54 nbi-636 sshd[1052]: Received disconnect from 62.234.94.46 port 40160:11: Bye Bye [preauth]
Oct 21 09:05:54 nbi-636 sshd[1052]: Disconnected from 62.234.94.46 port 40160 [preauth]
Oct 21 09:20:01 nbi-636 sshd[3797]: User r.r from 62.234.94.46 not allowed because not listed in AllowUsers
Oct 21 09:20:01 nbi-636 sshd[3797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.94.46  user=r.r
Oct 21 09:20:03 nbi-636 sshd[3797]: Failed password for invalid user r.r from 62.234.94.46 port 36456 ssh2
Oct 21 09:20:04 nbi-636 sshd[3797]: Received disconnect from 62.2........
-------------------------------
2019-10-23 23:59:30

Recently Reported IPs

45.0.0.0 129.12.7.18 107.6.199.125 210.173.22.87
146.208.161.45 155.1.222.228 109.63.241.138 218.40.8.118
149.20.174.103 53.228.182.50 190.126.33.139 140.90.224.217
182.116.90.50 255.3.117.228 93.125.28.75 0.0.237.194
164.162.185.142 78.50.180.132 14.201.209.224 196.43.241.99