Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.71.5.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10907
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.71.5.159.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022801 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 02:24:15 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 159.5.71.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 159.5.71.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
203.190.35.169 attackspambots
port scan and connect, tcp 23 (telnet)
2020-07-22 06:55:06
115.146.126.209 attackbots
Invalid user sip from 115.146.126.209 port 48148
2020-07-22 07:16:03
154.8.193.99 attack
IP reached maximum auth failures
2020-07-22 07:16:23
59.126.74.34 attackspambots
Honeypot attack, port: 81, PTR: 59-126-74-34.HINET-IP.hinet.net.
2020-07-22 07:09:29
92.63.196.8 attackbots
[H1.VM8] Blocked by UFW
2020-07-22 07:10:11
82.165.224.200 attackspambots
Automated report (2020-07-22T05:32:51+08:00). Misbehaving bot detected at this address.
2020-07-22 07:17:15
41.227.123.171 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-07-22 06:39:19
220.134.231.194 attack
Honeypot attack, port: 81, PTR: 220-134-231-194.HINET-IP.hinet.net.
2020-07-22 07:12:39
49.248.215.5 attackspambots
"fail2ban match"
2020-07-22 06:43:26
84.17.46.202 attackspambots
Forbidden directory scan :: 2020/07/21 21:33:21 [error] 1018#1018: *511409 access forbidden by rule, client: 84.17.46.202, server: [censored_1], request: "GET /.git//index HTTP/1.1", host: "www.[censored_1]"
2020-07-22 06:51:06
193.112.39.179 attackspambots
Jul 21 23:33:27 santamaria sshd\[10305\]: Invalid user chenrui from 193.112.39.179
Jul 21 23:33:27 santamaria sshd\[10305\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.39.179
Jul 21 23:33:29 santamaria sshd\[10305\]: Failed password for invalid user chenrui from 193.112.39.179 port 35780 ssh2
...
2020-07-22 06:38:44
137.116.81.130 attackspambots
2020-07-21T23:24:37.622484vps773228.ovh.net sshd[21906]: Invalid user vftp from 137.116.81.130 port 32826
2020-07-21T23:24:37.634259vps773228.ovh.net sshd[21906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.116.81.130
2020-07-21T23:24:37.622484vps773228.ovh.net sshd[21906]: Invalid user vftp from 137.116.81.130 port 32826
2020-07-21T23:24:39.742534vps773228.ovh.net sshd[21906]: Failed password for invalid user vftp from 137.116.81.130 port 32826 ssh2
2020-07-21T23:33:26.050421vps773228.ovh.net sshd[21986]: Invalid user tester from 137.116.81.130 port 46868
...
2020-07-22 06:46:15
191.184.40.60 attackbots
Jul 22 00:29:29 eventyay sshd[9309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.184.40.60
Jul 22 00:29:31 eventyay sshd[9309]: Failed password for invalid user min from 191.184.40.60 port 42834 ssh2
Jul 22 00:36:52 eventyay sshd[9509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.184.40.60
...
2020-07-22 06:49:53
1.214.215.236 attackbots
Jul 21 22:33:44 ip-172-31-62-245 sshd\[23747\]: Invalid user etherpad from 1.214.215.236\
Jul 21 22:33:46 ip-172-31-62-245 sshd\[23747\]: Failed password for invalid user etherpad from 1.214.215.236 port 53014 ssh2\
Jul 21 22:37:22 ip-172-31-62-245 sshd\[23786\]: Invalid user arduino from 1.214.215.236\
Jul 21 22:37:24 ip-172-31-62-245 sshd\[23786\]: Failed password for invalid user arduino from 1.214.215.236 port 50330 ssh2\
Jul 21 22:40:55 ip-172-31-62-245 sshd\[23895\]: Invalid user guest from 1.214.215.236\
2020-07-22 06:41:40
118.171.34.64 attack
Honeypot attack, port: 445, PTR: 118-171-34-64.dynamic-ip.hinet.net.
2020-07-22 06:42:48

Recently Reported IPs

248.165.176.161 217.56.130.175 139.98.116.7 72.116.245.204
252.70.182.177 103.48.31.31 208.214.99.12 181.92.3.234
205.73.91.58 72.79.222.26 42.10.240.21 94.80.233.90
152.123.175.229 231.201.129.227 56.198.21.7 191.151.126.156
150.223.246.191 202.66.128.132 246.32.232.241 248.49.149.8