Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: Research Organization of Information and Systems, National Institute of Informatics

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.1.139.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6747
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;157.1.139.41.			IN	A

;; AUTHORITY SECTION:
.			3030	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019042500 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Fri Apr 26 01:27:34 +08 2019
;; MSG SIZE  rcvd: 116

Host info
41.139.1.157.in-addr.arpa domain name pointer warehouse.dsc.nii.ac.jp.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
41.139.1.157.in-addr.arpa	name = warehouse.dsc.nii.ac.jp.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
138.99.6.177 attackspambots
2020-09-15 06:49:20 server sshd[17773]: Failed password for invalid user root from 138.99.6.177 port 51850 ssh2
2020-09-16 23:32:03
180.76.57.58 attackspambots
Sep 16 17:00:35 ip106 sshd[13427]: Failed password for root from 180.76.57.58 port 35432 ssh2
...
2020-09-16 23:16:24
184.170.212.94 attack
Failed password for root from 184.170.212.94 port 39784 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.170.212.94.16clouds.com  user=root
Failed password for root from 184.170.212.94 port 35796 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.170.212.94.16clouds.com  user=root
Failed password for root from 184.170.212.94 port 47934 ssh2
2020-09-16 23:24:28
47.105.188.17 attackspambots
47.105.188.17 - - \[16/Sep/2020:02:45:40 +0300\] "POST /xmlrpc.php HTTP/1.1" 301 178 "-" "Apache-HttpClient/4.5.2 \(Java/1.8.0_161\)" "-"
47.105.188.17 - - \[16/Sep/2020:02:45:40 +0300\] "POST /xmlrpc.php HTTP/1.1" 301 178 "-" "Apache-HttpClient/4.5.2 \(Java/1.8.0_161\)" "-"
...
2020-09-16 23:41:30
192.35.168.235 attackspam
firewall-block, port(s): 9645/tcp
2020-09-16 23:47:41
46.105.149.168 attack
Sep 16 13:06:40 scw-6657dc sshd[12976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.149.168
Sep 16 13:06:40 scw-6657dc sshd[12976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.149.168
Sep 16 13:06:41 scw-6657dc sshd[12976]: Failed password for invalid user sator from 46.105.149.168 port 49062 ssh2
...
2020-09-16 23:11:22
150.136.40.83 attackspam
5x Failed Password
2020-09-16 23:36:08
47.146.140.94 attack
Unauthorized connection attempt from IP address 47.146.140.94 on Port 445(SMB)
2020-09-16 23:27:39
182.61.44.177 attack
SSH brute-force attempt
2020-09-16 23:26:17
202.137.10.182 attack
Sep 16 19:54:32 gw1 sshd[27693]: Failed password for root from 202.137.10.182 port 38484 ssh2
Sep 16 19:59:43 gw1 sshd[27861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.137.10.182
...
2020-09-16 23:18:56
208.113.164.202 attack
<6 unauthorized SSH connections
2020-09-16 23:41:47
64.227.11.43 attackspambots
CMS (WordPress or Joomla) login attempt.
2020-09-16 23:37:33
124.105.87.254 attack
Fail2Ban Ban Triggered (2)
2020-09-16 23:10:58
142.93.241.19 attack
SSH bruteforce
2020-09-16 23:14:42
222.141.25.30 attack
Port Scan
...
2020-09-16 23:43:03

Recently Reported IPs

221.139.50.54 187.37.71.78 218.31.173.243 61.154.237.30
13.91.120.95 68.254.133.211 154.124.201.91 192.168.1.54
98.171.154.76 191.212.170.103 202.124.181.116 178.212.36.211
4.117.191.81 198.46.81.30 197.43.24.158 120.169.34.82
122.170.162.3 40.48.91.3 177.234.175.43 4.12.108.144