Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 144.57.137.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28748
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;144.57.137.159.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 19:06:43 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 159.137.57.144.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 159.137.57.144.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
182.109.130.76 attackspambots
Unauthorized connection attempt detected from IP address 182.109.130.76 to port 6656 [T]
2020-01-30 17:20:50
111.73.241.29 attackbotsspam
Unauthorized connection attempt detected from IP address 111.73.241.29 to port 6656 [T]
2020-01-30 17:04:13
36.33.20.107 attackspambots
Unauthorized connection attempt detected from IP address 36.33.20.107 to port 6656 [T]
2020-01-30 16:45:06
222.186.42.155 attackbotsspam
Jan 30 05:56:53 server sshd\[17059\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155  user=root
Jan 30 05:56:55 server sshd\[17059\]: Failed password for root from 222.186.42.155 port 19090 ssh2
Jan 30 05:56:56 server sshd\[17056\]: Failed password for root from 222.186.42.155 port 28367 ssh2
Jan 30 12:09:14 server sshd\[12170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155  user=root
Jan 30 12:09:15 server sshd\[12170\]: Failed password for root from 222.186.42.155 port 15035 ssh2
...
2020-01-30 17:14:45
112.252.69.245 attackbots
Unauthorized connection attempt detected from IP address 112.252.69.245 to port 6656 [T]
2020-01-30 17:02:28
176.108.176.199 attackspambots
Unauthorized connection attempt detected from IP address 176.108.176.199 to port 23 [T]
2020-01-30 16:51:31
61.138.222.203 attackbotsspam
Unauthorized connection attempt detected from IP address 61.138.222.203 to port 6656 [T]
2020-01-30 16:40:20
60.179.35.109 attackspam
Unauthorized connection attempt detected from IP address 60.179.35.109 to port 6656 [T]
2020-01-30 16:41:16
140.255.146.170 attack
Unauthorized connection attempt detected from IP address 140.255.146.170 to port 6656 [T]
2020-01-30 16:52:55
222.186.30.57 attackspambots
Jan 30 10:12:52 h2177944 sshd\[12937\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.57  user=root
Jan 30 10:12:54 h2177944 sshd\[12937\]: Failed password for root from 222.186.30.57 port 17365 ssh2
Jan 30 10:12:56 h2177944 sshd\[12937\]: Failed password for root from 222.186.30.57 port 17365 ssh2
Jan 30 10:12:58 h2177944 sshd\[12937\]: Failed password for root from 222.186.30.57 port 17365 ssh2
...
2020-01-30 17:16:28
182.110.116.133 attack
Unauthorized connection attempt detected from IP address 182.110.116.133 to port 6656 [T]
2020-01-30 16:50:39
106.5.123.166 attack
Unauthorized connection attempt detected from IP address 106.5.123.166 to port 6656 [T]
2020-01-30 17:05:45
106.56.247.95 attackbots
Unauthorized connection attempt detected from IP address 106.56.247.95 to port 6656 [T]
2020-01-30 17:04:59
114.229.56.135 attackspam
Unauthorized connection attempt detected from IP address 114.229.56.135 to port 6656 [T]
2020-01-30 17:00:24
111.73.242.66 attackspambots
Unauthorized connection attempt detected from IP address 111.73.242.66 to port 6656 [T]
2020-01-30 17:03:16

Recently Reported IPs

131.163.10.113 63.222.99.110 21.240.24.171 8.225.69.205
75.73.123.233 148.110.37.9 53.232.143.194 26.186.181.148
230.156.212.92 97.241.190.96 64.221.184.206 192.165.45.204
75.82.59.102 215.51.92.191 205.128.53.5 221.228.89.102
191.6.40.123 96.125.158.175 51.14.253.59 144.79.169.64