Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.162.241.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25502
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.162.241.139.		IN	A

;; AUTHORITY SECTION:
.			174	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022801 1800 900 604800 86400

;; Query time: 47 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 01 04:00:27 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 139.241.162.109.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.241.162.109.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
176.10.99.200 attack
searching backdoor
2019-11-16 16:38:21
41.191.71.73 attack
Unauthorised access (Nov 16) SRC=41.191.71.73 LEN=40 TOS=0x08 PREC=0x20 TTL=234 ID=35764 TCP DPT=1433 WINDOW=1024 SYN
2019-11-16 16:56:51
27.128.234.170 attack
2019-11-16T08:21:00.905614abusebot-2.cloudsearch.cf sshd\[13448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.234.170  user=root
2019-11-16 16:49:53
45.143.221.7 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-16 16:42:26
189.124.197.172 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-16 16:52:01
89.35.39.213 attack
searching backdoor
2019-11-16 16:27:33
123.16.254.102 attack
B: Magento admin pass test (wrong country)
2019-11-16 16:59:53
200.194.46.22 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-16 16:46:15
104.248.81.104 attack
11/16/2019-07:26:20.091878 104.248.81.104 Protocol: 6 ET CHAT IRC PING command
2019-11-16 17:00:49
148.251.116.53 attackbots
Nov 16 09:16:04 server sshd\[15608\]: Invalid user dyna from 148.251.116.53
Nov 16 09:16:04 server sshd\[15608\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=static.53.116.251.148.clients.your-server.de 
Nov 16 09:16:06 server sshd\[15608\]: Failed password for invalid user dyna from 148.251.116.53 port 55626 ssh2
Nov 16 09:26:42 server sshd\[18258\]: Invalid user ranch from 148.251.116.53
Nov 16 09:26:42 server sshd\[18258\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=static.53.116.251.148.clients.your-server.de 
...
2019-11-16 16:43:32
87.154.251.205 attack
Nov 16 09:22:54 mail postfix/smtpd[29465]: warning: p579AFBCD.dip0.t-ipconnect.de[87.154.251.205]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 16 09:25:45 mail postfix/smtpd[30512]: warning: p579AFBCD.dip0.t-ipconnect.de[87.154.251.205]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 16 09:26:11 mail postfix/smtpd[30326]: warning: p579AFBCD.dip0.t-ipconnect.de[87.154.251.205]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-16 16:55:49
94.39.238.123 attackbotsspam
Automatic report - Port Scan Attack
2019-11-16 16:49:02
82.64.15.106 attack
Invalid user pi from 82.64.15.106 port 34506
2019-11-16 16:21:21
176.193.142.138 attack
searching backdoor
2019-11-16 16:36:45
49.232.51.61 attackspam
Nov 16 07:47:51 localhost sshd\[73579\]: Invalid user mingy from 49.232.51.61 port 49826
Nov 16 07:47:51 localhost sshd\[73579\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.51.61
Nov 16 07:47:52 localhost sshd\[73579\]: Failed password for invalid user mingy from 49.232.51.61 port 49826 ssh2
Nov 16 07:52:56 localhost sshd\[73696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.51.61  user=root
Nov 16 07:52:58 localhost sshd\[73696\]: Failed password for root from 49.232.51.61 port 53832 ssh2
...
2019-11-16 16:23:08

Recently Reported IPs

109.162.241.136 109.162.241.14 109.162.241.144 109.162.241.140
109.162.241.148 109.162.241.15 109.162.241.152 109.162.241.154
109.162.241.156 109.162.241.142 109.162.241.158 109.162.241.16
109.162.241.162 109.162.241.164 109.162.241.167 109.162.241.160
109.162.241.168 109.162.241.172 109.162.241.170 109.162.241.174