Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Cologne

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
109.239.49.168 attackspambots
suspicious action Thu, 12 Mar 2020 09:31:07 -0300
2020-03-12 22:15:11
109.239.49.168 attack
detected by Fail2Ban
2019-07-29 11:53:17
109.239.49.168 attack
Jul 28 05:10:41 [munged] sshd[20360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.239.49.168  user=root
Jul 28 05:10:43 [munged] sshd[20360]: Failed password for root from 109.239.49.168 port 58842 ssh2
2019-07-28 19:20:14
109.239.49.168 attack
Automatic report - Banned IP Access
2019-07-26 06:02:39
109.239.49.168 attack
Jul 25 01:04:11 xtremcommunity sshd\[30271\]: Invalid user sk from 109.239.49.168 port 42286
Jul 25 01:04:11 xtremcommunity sshd\[30271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.239.49.168
Jul 25 01:04:13 xtremcommunity sshd\[30271\]: Failed password for invalid user sk from 109.239.49.168 port 42286 ssh2
Jul 25 01:09:02 xtremcommunity sshd\[30311\]: Invalid user testftp from 109.239.49.168 port 60782
Jul 25 01:09:02 xtremcommunity sshd\[30311\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.239.49.168
...
2019-07-25 13:11:19
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.239.49.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11510
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.239.49.245.			IN	A

;; AUTHORITY SECTION:
.			405	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030501 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 06 09:17:29 CST 2022
;; MSG SIZE  rcvd: 107
Host info
245.49.239.109.in-addr.arpa domain name pointer survey-server01.jaksch-partner.at.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
245.49.239.109.in-addr.arpa	name = survey-server01.jaksch-partner.at.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
116.247.81.100 attack
Feb  3 13:04:35 hgb10502 sshd[10702]: User r.r from 116.247.81.100 not allowed because not listed in AllowUsers
Feb  3 13:04:35 hgb10502 sshd[10702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.247.81.100  user=r.r
Feb  3 13:04:38 hgb10502 sshd[10702]: Failed password for invalid user r.r from 116.247.81.100 port 34917 ssh2
Feb  3 13:04:38 hgb10502 sshd[10702]: Received disconnect from 116.247.81.100 port 34917:11: Bye Bye [preauth]
Feb  3 13:04:38 hgb10502 sshd[10702]: Disconnected from 116.247.81.100 port 34917 [preauth]
Feb  3 13:13:04 hgb10502 sshd[11531]: User r.r from 116.247.81.100 not allowed because not listed in AllowUsers
Feb  3 13:13:04 hgb10502 sshd[11531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.247.81.100  user=r.r
Feb  3 13:13:06 hgb10502 sshd[11531]: Failed password for invalid user r.r from 116.247.81.100 port 42804 ssh2
Feb  3 13:13:06 hgb10502 sshd[115........
-------------------------------
2020-02-09 10:41:52
69.94.141.66 attackspam
Feb  3 19:26:52 tux postfix/smtpd[23036]: connect from spoken.holidayincape.com[69.94.141.66]
Feb x@x
Feb  3 19:26:56 tux postfix/smtpd[23036]: disconnect from spoken.holidayincape.com[69.94.141.66]
Feb  3 19:56:57 tux postfix/smtpd[23421]: connect from spoken.holidayincape.com[69.94.141.66]
Feb x@x
Feb  3 19:56:57 tux postfix/smtpd[23421]: disconnect from spoken.holidayincape.com[69.94.141.66]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=69.94.141.66
2020-02-09 10:59:55
179.232.1.254 attackbots
Feb  9 01:44:38 novum-srv2 sshd[4708]: Invalid user joh from 179.232.1.254 port 33961
Feb  9 01:44:54 novum-srv2 sshd[4710]: Invalid user joh from 179.232.1.254 port 36863
Feb  9 01:45:41 novum-srv2 sshd[4730]: Invalid user joh from 179.232.1.254 port 43375
...
2020-02-09 10:36:09
145.239.82.11 attackbots
Feb  9 03:44:59 mout sshd[9769]: Invalid user xhe from 145.239.82.11 port 53836
2020-02-09 10:46:53
82.46.227.61 attackbotsspam
Feb  9 01:22:26 mail sshd[24309]: Invalid user epr from 82.46.227.61
Feb  9 01:22:26 mail sshd[24309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.46.227.61
Feb  9 01:22:26 mail sshd[24309]: Invalid user epr from 82.46.227.61
Feb  9 01:22:28 mail sshd[24309]: Failed password for invalid user epr from 82.46.227.61 port 47036 ssh2
Feb  9 01:45:48 mail sshd[8038]: Invalid user syh from 82.46.227.61
...
2020-02-09 10:33:02
167.71.223.191 attackspambots
Feb  8 21:12:44 plusreed sshd[10315]: Invalid user osg from 167.71.223.191
...
2020-02-09 10:26:26
103.87.93.20 attackbotsspam
Feb  9 03:04:15 jane sshd[19270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.87.93.20 
Feb  9 03:04:17 jane sshd[19270]: Failed password for invalid user iff from 103.87.93.20 port 45800 ssh2
...
2020-02-09 10:55:39
118.24.55.171 attackspam
Feb  9 02:57:31 mout sshd[7018]: Invalid user pni from 118.24.55.171 port 18866
2020-02-09 10:58:38
52.34.83.11 attack
02/09/2020-03:19:48.676280 52.34.83.11 Protocol: 6 SURICATA TLS invalid record/traffic
2020-02-09 10:19:57
90.84.244.157 attack
Feb  9 02:25:28 haigwepa sshd[21337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.84.244.157 
Feb  9 02:25:30 haigwepa sshd[21337]: Failed password for invalid user puj from 90.84.244.157 port 59914 ssh2
...
2020-02-09 10:22:18
36.79.43.159 attackspambots
Feb  9 02:51:04 MK-Soft-Root2 sshd[12493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.79.43.159 
Feb  9 02:51:06 MK-Soft-Root2 sshd[12493]: Failed password for invalid user gac from 36.79.43.159 port 38690 ssh2
...
2020-02-09 10:22:48
107.173.34.178 attackbots
Feb  9 02:28:16 lnxmysql61 sshd[13692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.173.34.178
2020-02-09 10:42:55
14.255.101.220 attackspam
Unauthorized connection attempt from IP address 14.255.101.220 on Port 445(SMB)
2020-02-09 11:01:23
60.190.129.6 attackbots
Feb  2 23:19:40 sanyalnet-awsem3-1 sshd[2184]: Connection from 60.190.129.6 port 50760 on 172.30.0.184 port 22
Feb  2 23:19:41 sanyalnet-awsem3-1 sshd[2184]: reveeclipse mapping checking getaddrinfo for mail.jecjk.com [60.190.129.6] failed - POSSIBLE BREAK-IN ATTEMPT!
Feb  2 23:19:41 sanyalnet-awsem3-1 sshd[2184]: Invalid user oracle from 60.190.129.6
Feb  2 23:19:42 sanyalnet-awsem3-1 sshd[2184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.190.129.6 
Feb  2 23:19:43 sanyalnet-awsem3-1 sshd[2184]: Failed password for invalid user oracle from 60.190.129.6 port 50760 ssh2
Feb  2 23:19:44 sanyalnet-awsem3-1 sshd[2184]: Received disconnect from 60.190.129.6: 11: Normal Shutdown [preauth]
Feb  2 23:39:09 sanyalnet-awsem3-1 sshd[3181]: Connection from 60.190.129.6 port 43158 on 172.30.0.184 port 22
Feb  2 23:39:16 sanyalnet-awsem3-1 sshd[3181]: reveeclipse mapping checking getaddrinfo for mail.jecjk.com [60.190.129.6] failed - PO........
-------------------------------
2020-02-09 10:18:48
211.252.87.90 attackbots
Feb  8 22:47:27 firewall sshd[19489]: Invalid user sri from 211.252.87.90
Feb  8 22:47:29 firewall sshd[19489]: Failed password for invalid user sri from 211.252.87.90 port 18445 ssh2
Feb  8 22:50:57 firewall sshd[19715]: Invalid user frh from 211.252.87.90
...
2020-02-09 10:19:35

Recently Reported IPs

109.239.49.141 109.239.54.105 109.239.58.89 109.247.111.98
109.247.148.210 109.247.192.156 109.247.8.35 109.248.203.87
109.250.1.63 109.26.133.112 109.40.240.133 109.52.204.72
109.68.161.202 109.68.165.212 109.68.214.149 109.68.230.239
109.69.187.130 109.69.187.140 109.69.192.196 109.69.232.140