Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.139.49.253
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19396
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;157.139.49.253.			IN	A

;; AUTHORITY SECTION:
.			214	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019122900 1800 900 604800 86400

;; Query time: 930 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 30 00:32:43 CST 2019
;; MSG SIZE  rcvd: 118
Host info
253.49.139.157.in-addr.arpa domain name pointer pc147216.med.cornell.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
253.49.139.157.in-addr.arpa	name = pc147216.med.cornell.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.143.73.175 attackspam
Jul  5 21:20:46 relay postfix/smtpd\[7677\]: warning: unknown\[185.143.73.175\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  5 21:21:29 relay postfix/smtpd\[11604\]: warning: unknown\[185.143.73.175\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  5 21:22:07 relay postfix/smtpd\[11603\]: warning: unknown\[185.143.73.175\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  5 21:22:46 relay postfix/smtpd\[11602\]: warning: unknown\[185.143.73.175\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  5 21:23:24 relay postfix/smtpd\[15976\]: warning: unknown\[185.143.73.175\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-06 03:28:53
66.249.66.214 attackbots
Automatic report - Banned IP Access
2020-07-06 03:13:29
13.235.74.158 attackspam
SSH BruteForce Attack
2020-07-06 03:38:55
71.6.233.115 attackbots
[Wed Jul 01 13:52:06 2020] - DDoS Attack From IP: 71.6.233.115 Port: 119
2020-07-06 03:36:45
46.38.145.251 attackspambots
2020-07-05 21:53:13 auth_plain authenticator failed for (User) [46.38.145.251]: 535 Incorrect authentication data (set_id=qam@mailgw.lavrinenko.info)
2020-07-05 21:53:55 auth_plain authenticator failed for (User) [46.38.145.251]: 535 Incorrect authentication data (set_id=pcz@mailgw.lavrinenko.info)
...
2020-07-06 03:14:18
71.6.233.150 attackspambots
[Wed Jul 01 13:47:50 2020] - DDoS Attack From IP: 71.6.233.150 Port: 119
2020-07-06 03:45:58
49.205.124.187 attackspambots
20/7/5@14:35:58: FAIL: Alarm-Network address from=49.205.124.187
...
2020-07-06 03:38:34
159.203.124.234 attackbotsspam
Jul  5 21:19:21  sshd\[14009\]: Invalid user chris from 159.203.124.234Jul  5 21:19:24  sshd\[14009\]: Failed password for invalid user chris from 159.203.124.234 port 54071 ssh2
...
2020-07-06 03:47:24
45.125.65.52 attack
Jul  5 21:21:27 mail postfix/smtpd[17377]: warning: unknown[45.125.65.52]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  5 21:24:32 mail postfix/smtpd[17389]: warning: unknown[45.125.65.52]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  5 21:27:01 mail postfix/smtpd[17396]: warning: unknown[45.125.65.52]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-07-06 03:27:24
23.94.19.215 attackspambots
(From claudiauclement@yahoo.com) Hi, We are wondering if you would be interested in our service, where we can provide you with a dofollow link from Amazon (DA 96) back to streckerfamilychiropractic.com?

The price is just $77 per link, via Paypal.

To explain what DA is and the benefit for your website, along with a sample of an existing link, please read here: https://pastelink.net/1nm60

If you'd be interested in learning more, reply to this email but please make sure you include the word INTERESTED in the subject line field.

Kind Regards,
Claudia
2020-07-06 03:30:31
195.54.160.202 attackspam
07/05/2020-14:35:55.838409 195.54.160.202 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-07-06 03:40:52
112.85.42.232 attackbots
Jul  5 21:23:19 abendstille sshd\[15486\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.232  user=root
Jul  5 21:23:21 abendstille sshd\[15486\]: Failed password for root from 112.85.42.232 port 37675 ssh2
Jul  5 21:23:22 abendstille sshd\[15497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.232  user=root
Jul  5 21:23:23 abendstille sshd\[15486\]: Failed password for root from 112.85.42.232 port 37675 ssh2
Jul  5 21:23:24 abendstille sshd\[15497\]: Failed password for root from 112.85.42.232 port 49167 ssh2
...
2020-07-06 03:24:40
150.95.177.195 attackspam
Jul  5 19:14:41 onepixel sshd[2163461]: Failed password for root from 150.95.177.195 port 46664 ssh2
Jul  5 19:17:40 onepixel sshd[2165006]: Invalid user jessica from 150.95.177.195 port 43068
Jul  5 19:17:40 onepixel sshd[2165006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.95.177.195 
Jul  5 19:17:40 onepixel sshd[2165006]: Invalid user jessica from 150.95.177.195 port 43068
Jul  5 19:17:42 onepixel sshd[2165006]: Failed password for invalid user jessica from 150.95.177.195 port 43068 ssh2
2020-07-06 03:29:34
212.70.149.34 attackspam
2020-07-05 22:09:57 auth_plain authenticator failed for (User) [212.70.149.34]: 535 Incorrect authentication data (set_id=olenka@lavrinenko.info)
2020-07-05 22:10:35 auth_plain authenticator failed for (User) [212.70.149.34]: 535 Incorrect authentication data (set_id=olga@lavrinenko.info)
...
2020-07-06 03:15:27
106.75.133.250 attackbotsspam
20 attempts against mh-ssh on cloud
2020-07-06 03:50:47

Recently Reported IPs

115.70.241.23 10.217.144.139 215.249.189.218 197.232.60.155
70.229.23.169 175.116.216.98 165.78.2.179 106.40.238.19
173.189.11.140 76.52.182.234 192.121.138.40 152.164.96.32
162.117.70.201 189.44.190.209 79.8.66.17 50.24.200.114
55.62.162.158 203.160.130.207 45.80.247.251 181.81.82.69