Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Turkey

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 168.139.57.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11456
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;168.139.57.207.			IN	A

;; AUTHORITY SECTION:
.			538	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019092701 1800 900 604800 86400

;; Query time: 290 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Sep 28 07:21:17 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 207.57.139.168.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
Server:		10.251.0.1
Address:	10.251.0.1#53

** server can't find 207.57.139.168.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
148.70.154.10 attack
May 21 21:57:47 santamaria sshd\[20172\]: Invalid user avb from 148.70.154.10
May 21 21:57:47 santamaria sshd\[20172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.154.10
May 21 21:57:48 santamaria sshd\[20172\]: Failed password for invalid user avb from 148.70.154.10 port 43200 ssh2
...
2020-05-22 03:59:20
123.17.213.59 attackspambots
Invalid user avanthi from 123.17.213.59 port 64423
2020-05-22 04:02:22
181.28.254.49 attack
Invalid user llq from 181.28.254.49 port 54958
2020-05-22 04:26:42
202.179.76.187 attackspam
Invalid user vrr from 202.179.76.187 port 60176
2020-05-22 03:54:39
104.236.72.182 attackspam
5x Failed Password
2020-05-22 04:11:10
14.17.114.65 attack
Invalid user jyf from 14.17.114.65 port 38058
2020-05-22 03:48:29
118.25.91.168 attackbotsspam
SSH Brute-Forcing (server2)
2020-05-22 04:04:39
101.71.3.53 attackspam
May 21 08:21:02 Tower sshd[8527]: Connection from 101.71.3.53 port 46115 on 192.168.10.220 port 22 rdomain ""
May 21 08:21:04 Tower sshd[8527]: Invalid user iad from 101.71.3.53 port 46115
May 21 08:21:04 Tower sshd[8527]: error: Could not get shadow information for NOUSER
May 21 08:21:04 Tower sshd[8527]: Failed password for invalid user iad from 101.71.3.53 port 46115 ssh2
May 21 08:21:05 Tower sshd[8527]: Received disconnect from 101.71.3.53 port 46115:11: Bye Bye [preauth]
May 21 08:21:05 Tower sshd[8527]: Disconnected from invalid user iad 101.71.3.53 port 46115 [preauth]
2020-05-22 04:13:01
82.207.236.179 attack
Invalid user mez from 82.207.236.179 port 39250
2020-05-22 04:14:31
112.197.109.139 attackbots
Invalid user pi from 112.197.109.139 port 42429
2020-05-22 04:08:03
5.191.6.131 attackbotsspam
Invalid user system from 5.191.6.131 port 55758
2020-05-22 04:18:35
203.148.20.254 attack
May 21 10:28:33 Host-KLAX-C sshd[13745]: Disconnected from invalid user mvl 203.148.20.254 port 56280 [preauth]
...
2020-05-22 03:54:11
163.172.49.56 attackspam
Invalid user yangzishuang from 163.172.49.56 port 60150
2020-05-22 04:29:07
182.72.173.154 attackbotsspam
Invalid user tech from 182.72.173.154 port 62085
2020-05-22 03:56:49
117.15.169.130 attackspambots
Invalid user slm from 117.15.169.130 port 55973
2020-05-22 04:05:43

Recently Reported IPs

151.150.32.97 67.81.230.18 171.6.84.164 120.247.199.136
130.244.188.217 59.94.24.175 183.98.230.108 246.49.154.76
47.85.90.54 89.226.90.204 46.17.131.31 230.47.77.183
125.231.36.74 131.0.62.15 140.236.48.25 46.154.10.38
69.76.28.190 252.58.74.243 176.227.237.245 130.233.98.144