Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.239.57.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 289
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.239.57.136.			IN	A

;; AUTHORITY SECTION:
.			168	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031801 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 19 10:28:40 CST 2022
;; MSG SIZE  rcvd: 107
Host info
136.57.239.109.in-addr.arpa domain name pointer www.sozialstiftung-bamberg.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
136.57.239.109.in-addr.arpa	name = www.sozialstiftung-bamberg.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
23.129.64.162 attackbotsspam
Sep  5 08:35:04 thevastnessof sshd[18542]: Failed password for root from 23.129.64.162 port 44191 ssh2
...
2019-09-05 16:45:17
141.98.9.195 attackbotsspam
Sep  5 10:30:40 webserver postfix/smtpd\[18155\]: warning: unknown\[141.98.9.195\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  5 10:31:54 webserver postfix/smtpd\[18155\]: warning: unknown\[141.98.9.195\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  5 10:33:06 webserver postfix/smtpd\[18155\]: warning: unknown\[141.98.9.195\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  5 10:34:16 webserver postfix/smtpd\[18155\]: warning: unknown\[141.98.9.195\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  5 10:35:26 webserver postfix/smtpd\[18282\]: warning: unknown\[141.98.9.195\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-09-05 16:39:12
177.67.6.234 attack
Unauthorized connection attempt from IP address 177.67.6.234 on Port 445(SMB)
2019-09-05 16:51:21
128.199.177.16 attack
2019-07-19 02:59:23,519 fail2ban.actions        [753]: NOTICE  [sshd] Ban 128.199.177.16
2019-07-19 06:11:45,257 fail2ban.actions        [753]: NOTICE  [sshd] Ban 128.199.177.16
2019-07-19 09:22:53,712 fail2ban.actions        [753]: NOTICE  [sshd] Ban 128.199.177.16
...
2019-09-05 16:03:38
178.46.210.138 attackbotsspam
" "
2019-09-05 16:07:00
165.22.9.35 attackbotsspam
DATE:2019-09-05 09:08:07, IP:165.22.9.35, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-09-05 16:18:34
104.248.41.37 attackbotsspam
Sep  5 10:01:19 OPSO sshd\[31383\]: Invalid user student from 104.248.41.37 port 46118
Sep  5 10:01:19 OPSO sshd\[31383\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.41.37
Sep  5 10:01:21 OPSO sshd\[31383\]: Failed password for invalid user student from 104.248.41.37 port 46118 ssh2
Sep  5 10:05:40 OPSO sshd\[31966\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.41.37  user=admin
Sep  5 10:05:42 OPSO sshd\[31966\]: Failed password for admin from 104.248.41.37 port 60516 ssh2
2019-09-05 16:21:15
123.168.91.123 attack
Sep  5 10:30:57 MK-Soft-Root2 sshd\[31119\]: Invalid user grafika from 123.168.91.123 port 12180
Sep  5 10:30:57 MK-Soft-Root2 sshd\[31119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.168.91.123
Sep  5 10:30:59 MK-Soft-Root2 sshd\[31119\]: Failed password for invalid user grafika from 123.168.91.123 port 12180 ssh2
...
2019-09-05 16:31:16
62.234.109.203 attackspam
Sep  5 10:17:05 vps01 sshd[18583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.109.203
Sep  5 10:17:07 vps01 sshd[18583]: Failed password for invalid user ansible from 62.234.109.203 port 37410 ssh2
2019-09-05 16:28:20
89.248.174.201 attackbots
09/05/2019-04:35:04.621629 89.248.174.201 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 100
2019-09-05 16:35:57
117.220.2.61 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-04 22:37:45,073 INFO [amun_request_handler] PortScan Detected on Port: 445 (117.220.2.61)
2019-09-05 16:10:04
1.179.167.197 attackbots
Unauthorized connection attempt from IP address 1.179.167.197 on Port 445(SMB)
2019-09-05 16:54:04
61.177.137.38 attack
"Fail2Ban detected SSH brute force attempt"
2019-09-05 16:50:30
185.173.35.33 attackspambots
Honeypot attack, port: 135, PTR: 185.173.35.33.netsystemsresearch.com.
2019-09-05 16:21:58
117.217.76.213 attack
Automatic report - Port Scan Attack
2019-09-05 16:46:08

Recently Reported IPs

109.239.54.216 109.239.60.222 109.250.174.160 109.254.249.114
109.68.190.237 109.68.192.194 109.68.215.226 109.70.148.62
109.71.11.158 109.71.26.51 109.73.15.93 203.4.55.232
109.73.38.36 109.74.197.23 109.74.199.182 109.74.204.169
109.74.22.6 109.74.245.158 10.161.172.160 109.74.246.5