Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 22.139.83.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42955
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;22.139.83.157.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031200 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 13 00:43:32 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 157.83.139.22.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 157.83.139.22.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
192.241.211.215 attackbotsspam
Jul 16 07:04:25 PorscheCustomer sshd[18534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.211.215
Jul 16 07:04:28 PorscheCustomer sshd[18534]: Failed password for invalid user ftpuser from 192.241.211.215 port 40180 ssh2
Jul 16 07:12:38 PorscheCustomer sshd[18863]: Failed password for games from 192.241.211.215 port 46659 ssh2
...
2020-07-16 13:33:56
139.59.85.222 attackspam
Invalid user abuseio from 139.59.85.222 port 58344
2020-07-16 13:26:19
14.102.74.99 attackspambots
Jul 16 04:56:20 scw-6657dc sshd[11703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.102.74.99
Jul 16 04:56:20 scw-6657dc sshd[11703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.102.74.99
Jul 16 04:56:22 scw-6657dc sshd[11703]: Failed password for invalid user admin from 14.102.74.99 port 34488 ssh2
...
2020-07-16 13:33:25
83.85.157.145 attack
2020-07-16T03:54:15.135842Z 39f40096d41c New connection: 83.85.157.145:34790 (172.17.0.2:2222) [session: 39f40096d41c]
2020-07-16T03:54:15.137894Z f836f63b1a54 New connection: 83.85.157.145:34788 (172.17.0.2:2222) [session: f836f63b1a54]
2020-07-16 13:54:22
125.74.28.28 attackbotsspam
Jul 16 07:06:53 vps647732 sshd[16017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.28.28
Jul 16 07:06:55 vps647732 sshd[16017]: Failed password for invalid user t2 from 125.74.28.28 port 59288 ssh2
...
2020-07-16 13:30:40
49.236.203.163 attackspam
Jul 16 06:46:21 ift sshd\[18274\]: Invalid user racoon from 49.236.203.163Jul 16 06:46:23 ift sshd\[18274\]: Failed password for invalid user racoon from 49.236.203.163 port 54692 ssh2Jul 16 06:50:28 ift sshd\[19679\]: Invalid user shane from 49.236.203.163Jul 16 06:50:30 ift sshd\[19679\]: Failed password for invalid user shane from 49.236.203.163 port 57866 ssh2Jul 16 06:54:32 ift sshd\[20340\]: Invalid user ralph from 49.236.203.163
...
2020-07-16 13:39:51
222.186.175.148 attackbots
"Unauthorized connection attempt on SSHD detected"
2020-07-16 13:29:45
112.85.42.176 attackbotsspam
Automatic report BANNED IP
2020-07-16 13:15:52
52.172.195.6 attackbots
Jul 16 06:10:30 l02a sshd[9085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.172.195.6  user=root
Jul 16 06:10:33 l02a sshd[9085]: Failed password for root from 52.172.195.6 port 23159 ssh2
Jul 16 06:10:30 l02a sshd[9086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.172.195.6  user=root
Jul 16 06:10:33 l02a sshd[9086]: Failed password for root from 52.172.195.6 port 23164 ssh2
2020-07-16 13:20:02
52.247.30.42 attackbots
Jul 16 06:28:57 rancher-0 sshd[363136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.247.30.42  user=root
Jul 16 06:28:58 rancher-0 sshd[363136]: Failed password for root from 52.247.30.42 port 10110 ssh2
...
2020-07-16 13:42:23
159.65.138.161 attack
Port scanning [2 denied]
2020-07-16 13:19:19
164.90.212.48 attackspam
 TCP (SYN) 164.90.212.48:50731 -> port 22, len 44
2020-07-16 13:53:49
123.136.128.13 attackbotsspam
Jul 16 07:12:38 mout sshd[26365]: Invalid user web from 123.136.128.13 port 48237
2020-07-16 13:43:05
5.135.165.51 attackbotsspam
Jul 16 06:06:42 rocket sshd[13028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.165.51
Jul 16 06:06:44 rocket sshd[13028]: Failed password for invalid user lc from 5.135.165.51 port 47500 ssh2
...
2020-07-16 13:18:29
69.116.62.74 attackspam
Jul 16 06:13:51 ns382633 sshd\[32604\]: Invalid user git from 69.116.62.74 port 46983
Jul 16 06:13:51 ns382633 sshd\[32604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.116.62.74
Jul 16 06:13:53 ns382633 sshd\[32604\]: Failed password for invalid user git from 69.116.62.74 port 46983 ssh2
Jul 16 06:19:08 ns382633 sshd\[1281\]: Invalid user globus from 69.116.62.74 port 58626
Jul 16 06:19:08 ns382633 sshd\[1281\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.116.62.74
2020-07-16 13:36:08

Recently Reported IPs

157.126.235.145 144.143.87.117 239.224.103.110 8.226.105.125
119.50.237.205 142.207.139.172 2.108.6.187 236.239.19.197
152.36.70.103 215.101.250.87 178.94.49.91 40.45.97.4
53.214.36.78 219.48.233.141 97.132.6.167 186.179.29.69
17.39.202.9 168.23.251.93 233.164.105.37 139.170.128.71