Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.39.42.93
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33660
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.39.42.93.			IN	A

;; AUTHORITY SECTION:
.			597	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022092501 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 26 04:07:26 CST 2022
;; MSG SIZE  rcvd: 103
Host info
93.42.39.1.in-addr.arpa domain name pointer 1-39-42-93.live.vodafone.in.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
93.42.39.1.in-addr.arpa	name = 1-39-42-93.live.vodafone.in.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
98.146.212.146 attackspambots
Sep  1 15:34:54 jane sshd[20798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.146.212.146 
Sep  1 15:34:55 jane sshd[20798]: Failed password for invalid user hj from 98.146.212.146 port 41816 ssh2
...
2020-09-01 21:44:54
211.222.242.167 attackbotsspam
Honeypot hit.
2020-09-01 21:37:06
159.89.114.40 attack
(sshd) Failed SSH login from 159.89.114.40 (CA/Canada/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  1 08:27:04 server2 sshd[12749]: Invalid user riana from 159.89.114.40
Sep  1 08:27:04 server2 sshd[12749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.114.40 
Sep  1 08:27:06 server2 sshd[12749]: Failed password for invalid user riana from 159.89.114.40 port 48116 ssh2
Sep  1 08:35:44 server2 sshd[19846]: Invalid user zt from 159.89.114.40
Sep  1 08:35:44 server2 sshd[19846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.114.40
2020-09-01 21:29:55
122.165.194.191 attackbotsspam
Sep  1 15:18:01 home sshd[4061533]: Failed password for root from 122.165.194.191 port 41432 ssh2
Sep  1 15:22:58 home sshd[4063250]: Invalid user praveen from 122.165.194.191 port 45848
Sep  1 15:22:58 home sshd[4063250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.165.194.191 
Sep  1 15:22:58 home sshd[4063250]: Invalid user praveen from 122.165.194.191 port 45848
Sep  1 15:23:00 home sshd[4063250]: Failed password for invalid user praveen from 122.165.194.191 port 45848 ssh2
...
2020-09-01 21:48:00
45.84.196.99 attackbotsspam
sshd jail - ssh hack attempt
2020-09-01 21:51:44
222.186.30.76 attackspam
Sep  1 15:28:06 vps639187 sshd\[27663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.76  user=root
Sep  1 15:28:08 vps639187 sshd\[27663\]: Failed password for root from 222.186.30.76 port 62131 ssh2
Sep  1 15:28:09 vps639187 sshd\[27663\]: Failed password for root from 222.186.30.76 port 62131 ssh2
...
2020-09-01 21:32:10
85.209.0.103 attackbots
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-01T13:43:56Z
2020-09-01 21:49:50
103.115.126.138 attackbotsspam
Automatic report - Port Scan Attack
2020-09-01 21:39:47
2.232.248.6 attack
Brute-force attempt banned
2020-09-01 21:30:46
103.139.83.190 attackspambots
REPORT
2020-09-01 21:29:15
85.239.35.130 attackspambots
 TCP (SYN) 85.239.35.130:28734 -> port 1080, len 60
2020-09-01 21:44:20
37.48.68.104 attack
141.101.105.156 37.48.68.104 - [01/Sep/2020:13:41:25 +0000] "POST /wp-login.php HTTP/1.1" 302 Mozilla/5.0 (Windows NT 5.1; rv:29.0) Gecko/20100101 Firefox/29.0 0 PHP/7.3.20 1971738
141.101.77.174 37.48.68.104 - [01/Sep/2020:13:45:43 +0000] "POST /wp-login.php HTTP/1.1" 302 Mozilla/5.0 (Windows NT 5.1; rv:29.0) Gecko/20100101 Firefox/29.0 0 PHP/7.3.20 821466
141.101.77.4 37.48.68.104 - [01/Sep/2020:13:50:01 +0000] "POST /wp-login.php HTTP/1.1" 302 Mozilla/5.0 (Windows NT 5.1; rv:29.0) Gecko/20100101 Firefox/29.0 0 PHP/7.3.20 819083
2020-09-01 21:55:20
186.222.35.66 attackspam
Sep  1 12:31:11 vps-51d81928 sshd[151275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.222.35.66 
Sep  1 12:31:11 vps-51d81928 sshd[151275]: Invalid user postgres from 186.222.35.66 port 38142
Sep  1 12:31:13 vps-51d81928 sshd[151275]: Failed password for invalid user postgres from 186.222.35.66 port 38142 ssh2
Sep  1 12:34:28 vps-51d81928 sshd[151303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.222.35.66  user=root
Sep  1 12:34:30 vps-51d81928 sshd[151303]: Failed password for root from 186.222.35.66 port 43058 ssh2
...
2020-09-01 21:26:25
173.201.196.205 attackbots
Brute Force
2020-09-01 21:46:13
157.55.39.52 attackspam
Automatic report - Banned IP Access
2020-09-01 21:40:28

Recently Reported IPs

1.39.223.63 1.39.56.99 1.39.54.193 1.4.101.4
1.4.117.222 1.39.64.188 1.4.124.89 1.39.241.186
1.39.216.137 1.39.227.173 1.38.205.77 1.39.38.103
1.39.25.55 1.38.62.237 1.39.197.123 1.38.218.252
1.38.232.79 1.39.168.209 1.39.85.230 1.39.161.225