Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 211.58.163.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28797
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;211.58.163.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030800 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 08 21:35:09 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 139.163.58.211.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.163.58.211.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
118.89.245.153 attackbots
118.89.245.153 - - [26/Jul/2020:13:06:17 +0100] "POST /wp-login.php HTTP/1.1" 200 1968 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
118.89.245.153 - - [26/Jul/2020:13:06:22 +0100] "POST /wp-login.php HTTP/1.1" 200 1952 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
118.89.245.153 - - [26/Jul/2020:13:06:23 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-26 21:52:40
106.54.182.239 attackspambots
Exploited Host.
2020-07-26 22:19:47
203.170.140.201 attack
IP 203.170.140.201 attacked honeypot on port: 8080 at 7/26/2020 5:05:55 AM
2020-07-26 21:41:06
139.59.70.255 attackbotsspam
Jul 26 16:09:43 scivo sshd[25867]: reveeclipse mapping checking getaddrinfo for phytolife.api.webshostnamee [139.59.70.255] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul 26 16:09:43 scivo sshd[25867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.70.255  user=r.r
Jul 26 16:09:44 scivo sshd[25867]: Failed password for r.r from 139.59.70.255 port 44002 ssh2
Jul 26 16:09:45 scivo sshd[25867]: Connection closed by 139.59.70.255 [preauth]
Jul 26 16:12:26 scivo sshd[26011]: reveeclipse mapping checking getaddrinfo for phytolife.api.webshostnamee [139.59.70.255] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul 26 16:12:26 scivo sshd[26011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.70.255  user=r.r
Jul 26 16:12:28 scivo sshd[26011]: Failed password for r.r from 139.59.70.255 port 53104 ssh2
Jul 26 16:12:28 scivo sshd[26011]: Connection closed by 139.59.70.255 [preauth]
Jul 26 16:15:01 scivo ........
-------------------------------
2020-07-26 21:38:44
125.137.191.215 attack
Jul 26 14:06:35 ajax sshd[12061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.137.191.215 
Jul 26 14:06:37 ajax sshd[12061]: Failed password for invalid user mom from 125.137.191.215 port 916 ssh2
2020-07-26 21:58:48
62.234.164.238 attackspambots
Jul 26 15:44:20 mailserver sshd\[11654\]: Invalid user zhangb from 62.234.164.238
...
2020-07-26 21:49:10
222.186.173.183 attackspam
Jul 26 15:24:18 santamaria sshd\[23015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.183  user=root
Jul 26 15:24:20 santamaria sshd\[23015\]: Failed password for root from 222.186.173.183 port 58144 ssh2
Jul 26 15:24:23 santamaria sshd\[23015\]: Failed password for root from 222.186.173.183 port 58144 ssh2
...
2020-07-26 21:45:50
142.93.58.2 attackbotsspam
Forbidden directory scan :: 2020/07/26 13:50:01 [error] 3005#3005: *97002 access forbidden by rule, client: 142.93.58.2, server: [censored_1], request: "GET /.env HTTP/1.1", host: "www.[censored_1]"
2020/07/26 13:50:01 [error] 3005#3005: *97003 access forbidden by rule, client: 142.93.58.2, server: [censored_1], request: "GET /.env HTTP/1.1", host: "www.[censored_1]"
2020-07-26 22:19:35
212.70.149.19 attack
2020-07-26 15:37:09 dovecot_login authenticator failed for \(User\) \[212.70.149.19\]: 535 Incorrect authentication data \(set_id=jwkim@no-server.de\)
2020-07-26 15:37:11 dovecot_login authenticator failed for \(User\) \[212.70.149.19\]: 535 Incorrect authentication data \(set_id=jwkim@no-server.de\)
2020-07-26 15:37:19 dovecot_login authenticator failed for \(User\) \[212.70.149.19\]: 535 Incorrect authentication data \(set_id=jwy@no-server.de\)
2020-07-26 15:37:27 dovecot_login authenticator failed for \(User\) \[212.70.149.19\]: 535 Incorrect authentication data \(set_id=jwy@no-server.de\)
2020-07-26 15:37:35 dovecot_login authenticator failed for \(User\) \[212.70.149.19\]: 535 Incorrect authentication data \(set_id=jwy@no-server.de\)
2020-07-26 15:37:37 dovecot_login authenticator failed for \(User\) \[212.70.149.19\]: 535 Incorrect authentication data \(set_id=jwy@no-server.de\)
2020-07-26 15:37:42 dovecot_login authenticator failed for \(User\) \[212.70.149.19\]: 535 Incorrect a
...
2020-07-26 21:46:19
222.186.180.223 attackspambots
Jul 26 06:38:52 dignus sshd[17084]: Failed password for root from 222.186.180.223 port 22442 ssh2
Jul 26 06:38:56 dignus sshd[17084]: Failed password for root from 222.186.180.223 port 22442 ssh2
Jul 26 06:38:58 dignus sshd[17084]: Failed password for root from 222.186.180.223 port 22442 ssh2
Jul 26 06:39:02 dignus sshd[17084]: Failed password for root from 222.186.180.223 port 22442 ssh2
Jul 26 06:39:07 dignus sshd[17084]: Failed password for root from 222.186.180.223 port 22442 ssh2
...
2020-07-26 21:43:13
37.139.16.229 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 16 - port: 20025 proto: tcp cat: Misc Attackbytes: 60
2020-07-26 22:21:05
200.170.213.74 attack
Jul 26 14:33:10 vmd36147 sshd[14356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.170.213.74
Jul 26 14:33:12 vmd36147 sshd[14356]: Failed password for invalid user speech from 200.170.213.74 port 54482 ssh2
...
2020-07-26 21:52:02
124.123.223.44 attackbotsspam
Brute-force general attack.
2020-07-26 21:56:53
221.249.140.17 attackspambots
Jul 26 14:03:34 Ubuntu-1404-trusty-64-minimal sshd\[15070\]: Invalid user csgo from 221.249.140.17
Jul 26 14:03:34 Ubuntu-1404-trusty-64-minimal sshd\[15070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.249.140.17
Jul 26 14:03:36 Ubuntu-1404-trusty-64-minimal sshd\[15070\]: Failed password for invalid user csgo from 221.249.140.17 port 56062 ssh2
Jul 26 14:11:12 Ubuntu-1404-trusty-64-minimal sshd\[19853\]: Invalid user student from 221.249.140.17
Jul 26 14:11:12 Ubuntu-1404-trusty-64-minimal sshd\[19853\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.249.140.17
2020-07-26 22:08:09
103.238.69.138 attackbots
Jul 26 15:16:07 eventyay sshd[20526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.238.69.138
Jul 26 15:16:10 eventyay sshd[20526]: Failed password for invalid user ansible from 103.238.69.138 port 43654 ssh2
Jul 26 15:20:58 eventyay sshd[20732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.238.69.138
...
2020-07-26 21:40:25

Recently Reported IPs

49.18.43.116 209.248.198.87 79.31.110.74 238.191.29.153
156.156.174.75 193.10.34.249 80.2.249.66 211.202.215.112
142.52.122.27 227.10.17.163 254.220.164.199 14.216.131.73
14.71.148.108 77.204.126.9 52.228.237.75 253.195.150.126
230.112.71.121 142.226.231.51 116.20.73.221 247.125.122.129