Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Serbia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 185.157.45.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8539
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;185.157.45.139.			IN	A

;; AUTHORITY SECTION:
.			148	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100700 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 07 19:11:39 CST 2022
;; MSG SIZE  rcvd: 107
Host info
139.45.157.185.in-addr.arpa domain name pointer ip-185-157-45-139.oriontelekom.rs.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.45.157.185.in-addr.arpa	name = ip-185-157-45-139.oriontelekom.rs.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
40.78.133.79 attackbotsspam
$f2bV_matches
2019-12-31 15:48:39
78.128.113.190 attack
21 attempts against mh_ha-misbehave-ban on oak.magehost.pro
2019-12-31 15:44:38
54.39.145.31 attack
2019-12-31T07:27:30.7827141240 sshd\[28592\]: Invalid user aoyule from 54.39.145.31 port 42748
2019-12-31T07:27:30.7865061240 sshd\[28592\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.145.31
2019-12-31T07:27:33.0334681240 sshd\[28592\]: Failed password for invalid user aoyule from 54.39.145.31 port 42748 ssh2
...
2019-12-31 16:08:08
218.58.124.42 attack
--- report ---
Dec 31 03:53:18 -0300 sshd: Connection from 218.58.124.42 port 18033
Dec 31 03:53:22 -0300 sshd: Failed password for root from 218.58.124.42 port 18033 ssh2
Dec 31 03:53:22 -0300 sshd: Received disconnect from 218.58.124.42: 11: Normal Shutdown, Thank you for playing [preauth]
2019-12-31 15:58:53
59.125.204.211 attack
19/12/31@01:59:05: FAIL: Alarm-Network address from=59.125.204.211
...
2019-12-31 16:15:15
14.232.152.158 attackbots
Autoban   14.232.152.158 AUTH/CONNECT
2019-12-31 16:04:28
123.142.13.234 attackbots
" "
2019-12-31 16:11:19
119.120.40.40 attackbotsspam
CN from [119.120.40.40] port=5836 helo=aspmx.l.google.com
2019-12-31 16:12:48
49.232.35.211 attackbots
Dec 31 07:57:30 markkoudstaal sshd[20807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.35.211
Dec 31 07:57:31 markkoudstaal sshd[20807]: Failed password for invalid user chesney from 49.232.35.211 port 49146 ssh2
Dec 31 08:01:34 markkoudstaal sshd[21124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.35.211
2019-12-31 16:05:46
45.227.255.149 attackspam
over 100 attempt today of SQL Injection on our website
2019-12-31 15:42:34
140.143.193.52 attackbots
Dec 31 07:11:01 localhost sshd[24345]: Failed password for root from 140.143.193.52 port 58276 ssh2
Dec 31 07:24:06 localhost sshd[24723]: Failed password for invalid user server from 140.143.193.52 port 49046 ssh2
Dec 31 07:27:11 localhost sshd[24780]: Failed password for invalid user hugo from 140.143.193.52 port 40644 ssh2
2019-12-31 16:19:12
183.82.118.131 attackbotsspam
Dec 31 09:01:14 [host] sshd[25509]: Invalid user admin from 183.82.118.131
Dec 31 09:01:14 [host] sshd[25509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.118.131
Dec 31 09:01:17 [host] sshd[25509]: Failed password for invalid user admin from 183.82.118.131 port 44334 ssh2
2019-12-31 16:03:57
186.210.219.187 attack
Port Scan
2019-12-31 15:49:22
81.214.243.80 attackspam
Automatic report - Port Scan Attack
2019-12-31 16:00:59
112.85.42.94 attack
Dec 31 08:55:07 ArkNodeAT sshd\[21307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.94  user=root
Dec 31 08:55:09 ArkNodeAT sshd\[21307\]: Failed password for root from 112.85.42.94 port 54895 ssh2
Dec 31 08:55:13 ArkNodeAT sshd\[21307\]: Failed password for root from 112.85.42.94 port 54895 ssh2
2019-12-31 15:57:28

Recently Reported IPs

146.112.163.44 47.242.50.36 118.137.35.109 203.151.232.5
89.250.166.124 103.183.99.149 31.208.62.91 27.74.164.204
27.73.162.209 38.15.149.22 149.18.30.79 185.156.73.157
134.209.108.109 134.255.38.66 143.198.231.219 173.51.116.242
138.2.71.74 144.202.21.19 190.104.134.145 173.51.192.165