Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.237.140.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21660
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.237.140.13.			IN	A

;; AUTHORITY SECTION:
.			586	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 05:35:24 CST 2022
;; MSG SIZE  rcvd: 107
Host info
13.140.237.109.in-addr.arpa domain name pointer alfa3211.alfahosting-server.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
13.140.237.109.in-addr.arpa	name = alfa3211.alfahosting-server.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.254.68.172 attackspam
185.254.68.172 was recorded 176 times by 3 hosts attempting to connect to the following ports: 9060,7373,2211,6560,1819,8490,4460,9160,2311,1920,8590,4560,9260,7676,6760,1211,2411,8690,4660,9360,6860,8181,4640,8790,4760,8282,9460,6960,2611,3399,8890,4860,7060,9560,8383,3499,2711,8990,7160,8484,9660,2811,3599,4960,9090,8686,7260,9760,2911,3699,5060,7360,9191,3799,3011,9190,9860,5160,7460,9290,9292,3899,9960,3111,5260,9393,9390,7560,3999,1190,3211,5360,9490,4099,9494,1290,7660,3311,5460,4199,3411,7760,1390,5560,2830,9690,3511,4299,7860,1490,5660,2930,4399,1590,3611,9790,7960,5760,3030,4499,9890,3711,8060,1690,6599,3811,8160,4599,5860,9990,1790. Incident counter (4h, 24h, all-time): 176, 870, 5531
2019-11-19 23:39:06
45.249.80.131 attack
2019-11-19T13:02:59.956466abusebot-2.cloudsearch.cf sshd\[26159\]: Invalid user user1 from 45.249.80.131 port 57950
2019-11-19 23:23:29
223.247.223.194 attackspam
SSH Brute-Force attacks
2019-11-19 23:26:47
222.186.180.17 attackbotsspam
Nov 18 03:41:15 microserver sshd[22625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17  user=root
Nov 18 03:41:17 microserver sshd[22625]: Failed password for root from 222.186.180.17 port 20532 ssh2
Nov 18 03:41:20 microserver sshd[22625]: Failed password for root from 222.186.180.17 port 20532 ssh2
Nov 18 03:41:24 microserver sshd[22625]: Failed password for root from 222.186.180.17 port 20532 ssh2
Nov 18 06:30:37 microserver sshd[44259]: Failed none for root from 222.186.180.17 port 36016 ssh2
Nov 18 06:30:38 microserver sshd[44259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17  user=root
Nov 18 06:30:40 microserver sshd[44259]: Failed password for root from 222.186.180.17 port 36016 ssh2
Nov 18 06:30:43 microserver sshd[44259]: Failed password for root from 222.186.180.17 port 36016 ssh2
Nov 18 06:30:46 microserver sshd[44259]: Failed password for root from 222.186.180.17 port 36016 ssh2
Nov
2019-11-19 23:27:08
106.75.178.195 attack
Nov 19 09:18:33 ny01 sshd[2648]: Failed password for root from 106.75.178.195 port 51990 ssh2
Nov 19 09:23:18 ny01 sshd[3092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.178.195
Nov 19 09:23:20 ny01 sshd[3092]: Failed password for invalid user zanardi from 106.75.178.195 port 50538 ssh2
2019-11-19 23:13:05
85.114.100.161 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/85.114.100.161/ 
 
 PS - 1H : (4)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : PS 
 NAME ASN : ASN42314 
 
 IP : 85.114.100.161 
 
 CIDR : 85.114.100.0/24 
 
 PREFIX COUNT : 40 
 
 UNIQUE IP COUNT : 10240 
 
 
 ATTACKS DETECTED ASN42314 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-11-19 14:02:27 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-11-19 23:46:04
222.82.237.238 attackbotsspam
Nov 19 08:02:39 Tower sshd[14360]: Connection from 222.82.237.238 port 60630 on 192.168.10.220 port 22
Nov 19 08:02:47 Tower sshd[14360]: Invalid user smieciu from 222.82.237.238 port 60630
Nov 19 08:02:47 Tower sshd[14360]: error: Could not get shadow information for NOUSER
Nov 19 08:02:47 Tower sshd[14360]: Failed password for invalid user smieciu from 222.82.237.238 port 60630 ssh2
Nov 19 08:02:48 Tower sshd[14360]: Received disconnect from 222.82.237.238 port 60630:11: Bye Bye [preauth]
Nov 19 08:02:48 Tower sshd[14360]: Disconnected from invalid user smieciu 222.82.237.238 port 60630 [preauth]
2019-11-19 23:28:58
68.183.160.63 attack
2019-11-19T15:06:26.583052shield sshd\[31374\]: Invalid user localhost from 68.183.160.63 port 60982
2019-11-19T15:06:26.587237shield sshd\[31374\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.160.63
2019-11-19T15:06:28.226192shield sshd\[31374\]: Failed password for invalid user localhost from 68.183.160.63 port 60982 ssh2
2019-11-19T15:10:29.203806shield sshd\[31693\]: Invalid user huangkun from 68.183.160.63 port 48918
2019-11-19T15:10:29.208273shield sshd\[31693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.160.63
2019-11-19 23:22:05
187.158.132.18 attackbotsspam
Unauthorized connection attempt from IP address 187.158.132.18 on Port 445(SMB)
2019-11-19 23:53:17
87.245.163.250 attack
postfix (unknown user, SPF fail or relay access denied)
2019-11-19 23:51:18
157.230.92.254 attackspambots
C1,WP GET /suche/wp-login.php
2019-11-19 23:30:12
105.158.15.147 attackbots
Nov 19 13:56:37 mxgate1 postfix/postscreen[7608]: CONNECT from [105.158.15.147]:21221 to [176.31.12.44]:25
Nov 19 13:56:37 mxgate1 postfix/dnsblog[7612]: addr 105.158.15.147 listed by domain zen.spamhaus.org as 127.0.0.3
Nov 19 13:56:37 mxgate1 postfix/dnsblog[7612]: addr 105.158.15.147 listed by domain zen.spamhaus.org as 127.0.0.11
Nov 19 13:56:37 mxgate1 postfix/dnsblog[7612]: addr 105.158.15.147 listed by domain zen.spamhaus.org as 127.0.0.4
Nov 19 13:56:37 mxgate1 postfix/dnsblog[7610]: addr 105.158.15.147 listed by domain cbl.abuseat.org as 127.0.0.2
Nov 19 13:56:37 mxgate1 postfix/dnsblog[7611]: addr 105.158.15.147 listed by domain b.barracudacentral.org as 127.0.0.2
Nov 19 13:56:43 mxgate1 postfix/postscreen[7608]: DNSBL rank 4 for [105.158.15.147]:21221
Nov x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=105.158.15.147
2019-11-19 23:26:26
222.186.175.169 attackspambots
Nov 19 16:49:20 vmanager6029 sshd\[2946\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
Nov 19 16:49:22 vmanager6029 sshd\[2946\]: Failed password for root from 222.186.175.169 port 43688 ssh2
Nov 19 16:49:26 vmanager6029 sshd\[2946\]: Failed password for root from 222.186.175.169 port 43688 ssh2
2019-11-19 23:51:43
218.23.104.250 attackspam
Nov 19 15:48:29 server sshd\[12974\]: Invalid user admin from 218.23.104.250
Nov 19 15:48:29 server sshd\[12974\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.23.104.250 
Nov 19 15:48:31 server sshd\[12974\]: Failed password for invalid user admin from 218.23.104.250 port 57002 ssh2
Nov 19 16:02:35 server sshd\[16571\]: Invalid user backup from 218.23.104.250
Nov 19 16:02:35 server sshd\[16571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.23.104.250 
...
2019-11-19 23:38:39
106.12.133.247 attackbots
Nov 19 16:19:55 [host] sshd[4246]: Invalid user burleson from 106.12.133.247
Nov 19 16:19:55 [host] sshd[4246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.133.247
Nov 19 16:19:57 [host] sshd[4246]: Failed password for invalid user burleson from 106.12.133.247 port 45416 ssh2
2019-11-19 23:36:00

Recently Reported IPs

109.237.140.11 109.237.140.20 109.237.140.38 109.237.140.48
109.237.140.52 109.237.142.17 109.237.2.66 109.237.192.54
109.237.221.196 109.237.218.54 109.237.222.58 109.237.96.234
109.237.96.48 109.238.14.123 109.238.12.140 109.238.182.218
109.238.186.120 109.238.242.40 109.238.50.154 109.238.50.230