Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.141.138.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52734
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.141.138.157.		IN	A

;; AUTHORITY SECTION:
.			548	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022072202 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 23 05:29:39 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 157.138.141.159.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 157.138.141.159.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
142.44.218.192 attackbots
Sep 13 05:47:47 yabzik sshd[10450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.218.192
Sep 13 05:47:48 yabzik sshd[10450]: Failed password for invalid user web5 from 142.44.218.192 port 53112 ssh2
Sep 13 05:53:39 yabzik sshd[12416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.218.192
2019-09-13 14:24:28
51.15.11.70 attack
Sep 13 09:32:56 taivassalofi sshd[231560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.11.70
Sep 13 09:32:58 taivassalofi sshd[231560]: Failed password for invalid user mcguitaruser from 51.15.11.70 port 34018 ssh2
...
2019-09-13 14:36:25
83.11.17.213 attackspambots
" "
2019-09-13 14:22:31
104.131.218.9 attack
Port scan: Attack repeated for 24 hours
2019-09-13 14:25:36
78.36.44.104 attack
Brute force attempt
2019-09-13 14:35:40
116.206.247.207 attackspambots
LK - 1H : (1)  Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : LK 
 NAME ASN : ASN18001 
 
 IP : 116.206.247.207 
 
 CIDR : 116.206.244.0/22 
 
 PREFIX COUNT : 101 
 
 UNIQUE IP COUNT : 165888 
 
 
 WYKRYTE ATAKI Z ASN18001 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery 
  https://help-dysk.pl
2019-09-13 14:33:11
138.68.57.99 attack
Sep 12 20:59:30 web1 sshd\[16801\]: Invalid user m1necraft from 138.68.57.99
Sep 12 20:59:30 web1 sshd\[16801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.57.99
Sep 12 20:59:32 web1 sshd\[16801\]: Failed password for invalid user m1necraft from 138.68.57.99 port 50362 ssh2
Sep 12 21:04:15 web1 sshd\[17219\]: Invalid user guest@123 from 138.68.57.99
Sep 12 21:04:15 web1 sshd\[17219\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.57.99
2019-09-13 15:09:45
213.74.203.106 attackbotsspam
Sep 13 09:50:52 server sshd\[2610\]: Invalid user Passw0rd from 213.74.203.106 port 41176
Sep 13 09:50:52 server sshd\[2610\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.74.203.106
Sep 13 09:50:54 server sshd\[2610\]: Failed password for invalid user Passw0rd from 213.74.203.106 port 41176 ssh2
Sep 13 09:56:05 server sshd\[23725\]: Invalid user administrateur from 213.74.203.106 port 36369
Sep 13 09:56:05 server sshd\[23725\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.74.203.106
2019-09-13 15:07:28
153.36.242.143 attack
Sep 13 08:41:12 [host] sshd[24291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.242.143  user=root
Sep 13 08:41:14 [host] sshd[24291]: Failed password for root from 153.36.242.143 port 60932 ssh2
Sep 13 08:41:17 [host] sshd[24291]: Failed password for root from 153.36.242.143 port 60932 ssh2
2019-09-13 14:51:18
130.61.83.71 attack
Sep 13 03:03:01 ny01 sshd[29147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.83.71
Sep 13 03:03:03 ny01 sshd[29147]: Failed password for invalid user steam from 130.61.83.71 port 57833 ssh2
Sep 13 03:07:35 ny01 sshd[29953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.83.71
2019-09-13 15:15:05
137.74.44.162 attackbotsspam
Sep 12 20:28:39 friendsofhawaii sshd\[30762\]: Invalid user mc from 137.74.44.162
Sep 12 20:28:39 friendsofhawaii sshd\[30762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.ip-137-74-44.eu
Sep 12 20:28:41 friendsofhawaii sshd\[30762\]: Failed password for invalid user mc from 137.74.44.162 port 49403 ssh2
Sep 12 20:33:00 friendsofhawaii sshd\[31086\]: Invalid user 1234 from 137.74.44.162
Sep 12 20:33:00 friendsofhawaii sshd\[31086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.ip-137-74-44.eu
2019-09-13 14:34:29
104.128.69.146 attack
Sep 13 05:44:58 markkoudstaal sshd[4864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.128.69.146
Sep 13 05:45:00 markkoudstaal sshd[4864]: Failed password for invalid user testtest from 104.128.69.146 port 41346 ssh2
Sep 13 05:49:28 markkoudstaal sshd[5233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.128.69.146
2019-09-13 14:26:22
167.99.76.71 attack
Sep 13 07:01:45 hcbbdb sshd\[30855\]: Invalid user deployer from 167.99.76.71
Sep 13 07:01:45 hcbbdb sshd\[30855\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.76.71
Sep 13 07:01:46 hcbbdb sshd\[30855\]: Failed password for invalid user deployer from 167.99.76.71 port 48892 ssh2
Sep 13 07:07:20 hcbbdb sshd\[31442\]: Invalid user git from 167.99.76.71
Sep 13 07:07:20 hcbbdb sshd\[31442\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.76.71
2019-09-13 15:14:29
188.217.2.122 attack
Automatic report - Port Scan Attack
2019-09-13 15:03:10
51.75.249.28 attackspambots
Sep 13 02:38:11 vps200512 sshd\[31652\]: Invalid user musicbot from 51.75.249.28
Sep 13 02:38:11 vps200512 sshd\[31652\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.249.28
Sep 13 02:38:13 vps200512 sshd\[31652\]: Failed password for invalid user musicbot from 51.75.249.28 port 40616 ssh2
Sep 13 02:42:30 vps200512 sshd\[31820\]: Invalid user chris from 51.75.249.28
Sep 13 02:42:30 vps200512 sshd\[31820\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.249.28
2019-09-13 14:48:03

Recently Reported IPs

159.140.92.19 159.141.29.58 159.138.255.164 159.138.209.116
159.141.172.217 159.141.28.13 159.140.91.184 159.140.175.232
159.138.35.63 159.140.52.33 159.138.43.149 159.140.29.4
159.138.254.72 159.138.176.231 159.14.247.245 159.141.124.61
159.140.255.164 159.141.161.152 159.138.24.72 159.141.150.15