Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Oslo

Region: Oslo

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.139.157.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16558
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;195.139.157.105.		IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022112800 1800 900 604800 86400

;; Query time: 94 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Nov 28 14:25:47 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 105.157.139.195.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 105.157.139.195.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.15.162.54 attackbotsspam
SIPVicious Scanner Detection
2019-09-21 06:21:49
99.236.28.21 attackbotsspam
Invalid user gadmin from 99.236.28.21 port 39536
2019-09-21 06:26:34
197.253.6.249 attack
2019-09-20T22:29:23.584125  sshd[31756]: Invalid user mongod123 from 197.253.6.249 port 36619
2019-09-20T22:29:23.597475  sshd[31756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.253.6.249
2019-09-20T22:29:23.584125  sshd[31756]: Invalid user mongod123 from 197.253.6.249 port 36619
2019-09-20T22:29:26.451487  sshd[31756]: Failed password for invalid user mongod123 from 197.253.6.249 port 36619 ssh2
2019-09-20T22:34:27.339395  sshd[31879]: Invalid user skin from 197.253.6.249 port 57756
...
2019-09-21 06:30:28
185.175.93.18 attackbots
slow and persistent scanner
2019-09-21 06:34:56
66.249.64.30 attackspam
Automatic report - Banned IP Access
2019-09-21 06:13:18
217.182.253.230 attackspambots
2019-09-20T22:18:10.023097abusebot-4.cloudsearch.cf sshd\[12282\]: Invalid user fz from 217.182.253.230 port 36988
2019-09-21 06:30:04
106.12.56.88 attack
Sep 20 22:20:02 MainVPS sshd[12832]: Invalid user admin from 106.12.56.88 port 36598
Sep 20 22:20:02 MainVPS sshd[12832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.56.88
Sep 20 22:20:02 MainVPS sshd[12832]: Invalid user admin from 106.12.56.88 port 36598
Sep 20 22:20:04 MainVPS sshd[12832]: Failed password for invalid user admin from 106.12.56.88 port 36598 ssh2
Sep 20 22:25:07 MainVPS sshd[13204]: Invalid user ranjeet from 106.12.56.88 port 48994
...
2019-09-21 06:28:58
46.41.150.187 attack
Sep 20 19:19:31 ip-172-31-62-245 sshd\[22921\]: Invalid user gmmisdt from 46.41.150.187\
Sep 20 19:19:32 ip-172-31-62-245 sshd\[22921\]: Failed password for invalid user gmmisdt from 46.41.150.187 port 54836 ssh2\
Sep 20 19:23:41 ip-172-31-62-245 sshd\[22962\]: Invalid user Admin from 46.41.150.187\
Sep 20 19:23:43 ip-172-31-62-245 sshd\[22962\]: Failed password for invalid user Admin from 46.41.150.187 port 35778 ssh2\
Sep 20 19:27:47 ip-172-31-62-245 sshd\[23017\]: Invalid user admin from 46.41.150.187\
2019-09-21 06:16:41
102.184.158.11 attackbots
php WP PHPmyadamin ABUSE blocked for 12h
2019-09-21 06:39:14
222.186.15.101 attack
Sep 20 12:21:57 web1 sshd\[4440\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.101  user=root
Sep 20 12:21:59 web1 sshd\[4440\]: Failed password for root from 222.186.15.101 port 60972 ssh2
Sep 20 12:22:02 web1 sshd\[4440\]: Failed password for root from 222.186.15.101 port 60972 ssh2
Sep 20 12:22:04 web1 sshd\[4440\]: Failed password for root from 222.186.15.101 port 60972 ssh2
Sep 20 12:25:01 web1 sshd\[4888\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.101  user=root
2019-09-21 06:31:17
182.61.55.239 attackspambots
[ssh] SSH attack
2019-09-21 06:34:18
86.34.182.50 attackbotsspam
Sep 20 23:50:55 vps691689 sshd[30161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.34.182.50
Sep 20 23:50:56 vps691689 sshd[30161]: Failed password for invalid user rtorrent from 86.34.182.50 port 44558 ssh2
...
2019-09-21 06:11:34
128.199.177.224 attack
Automated report - ssh fail2ban:
Sep 20 22:25:46 authentication failure 
Sep 20 22:25:48 wrong password, user=elena, port=43004, ssh2
Sep 20 22:30:33 authentication failure
2019-09-21 06:40:02
186.122.149.38 attack
Sep 20 09:29:45 php1 sshd\[7941\]: Invalid user hitleap from 186.122.149.38
Sep 20 09:29:45 php1 sshd\[7941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.149.38
Sep 20 09:29:47 php1 sshd\[7941\]: Failed password for invalid user hitleap from 186.122.149.38 port 50378 ssh2
Sep 20 09:35:01 php1 sshd\[8483\]: Invalid user admin from 186.122.149.38
Sep 20 09:35:01 php1 sshd\[8483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.149.38
2019-09-21 06:43:34
103.129.220.214 attackspambots
Sep 21 00:15:35 plex sshd[13923]: Invalid user office from 103.129.220.214 port 42324
2019-09-21 06:47:32

Recently Reported IPs

195.123.226.61 109.48.142.152 150.129.246.15 238.186.108.10
101.109.168.11 9.51.54.21 131.24.207.235 172.16.18.148
183.17.229.250 213.255.247.221 242.113.148.84 99.19.118.155
220.115.151.13 44.59.145.75 111.204.103.144 78.80.46.249
222.4.179.141 94.197.97.237 107.153.34.15 252.50.34.8