Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: Vodafone GmbH

Hostname: unknown

Organization: unknown

Usage Type: Mobile ISP

Comments:
Type Details Datetime
attack
Feb 27 06:42:08 [host] kernel: [5980883.485364] [U
Feb 27 06:42:08 [host] kernel: [5980883.936164] [U
Feb 27 06:42:09 [host] kernel: [5980884.839084] [U
Feb 27 06:42:11 [host] kernel: [5980886.640703] [U
Feb 27 06:42:15 [host] kernel: [5980890.247019] [U
Feb 27 06:42:22 [host] kernel: [5980897.461643] [U
2020-02-27 20:29:19
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.42.0.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10400
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;109.42.0.139.			IN	A

;; AUTHORITY SECTION:
.			543	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020022700 1800 900 604800 86400

;; Query time: 114 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 20:29:12 CST 2020
;; MSG SIZE  rcvd: 116
Host info
139.0.42.109.in-addr.arpa domain name pointer ip-109-42-0-139.web.vodafone.de.
Nslookup info:
Server:		100.100.2.138
Address:	100.100.2.138#53

Non-authoritative answer:
139.0.42.109.in-addr.arpa	name = ip-109-42-0-139.web.vodafone.de.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
36.156.158.207 attackspambots
$f2bV_matches
2020-09-18 19:23:24
119.28.53.199 attackbotsspam
Sep 18 09:35:38 scw-focused-cartwright sshd[20120]: Failed password for root from 119.28.53.199 port 48252 ssh2
2020-09-18 19:38:54
139.215.208.125 attack
2020-09-18 12:45:44,153 fail2ban.actions: WARNING [ssh] Ban 139.215.208.125
2020-09-18 19:30:53
1.9.128.2 attackspam
$f2bV_matches
2020-09-18 19:15:47
222.252.11.10 attackspambots
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-09-18T10:44:07Z and 2020-09-18T10:53:28Z
2020-09-18 19:10:31
106.13.168.107 attackspambots
$f2bV_matches
2020-09-18 19:30:02
164.132.44.218 attackbots
Sep 18 13:07:17 PorscheCustomer sshd[2011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.44.218
Sep 18 13:07:19 PorscheCustomer sshd[2011]: Failed password for invalid user vagrant from 164.132.44.218 port 44806 ssh2
Sep 18 13:11:49 PorscheCustomer sshd[2120]: Failed password for root from 164.132.44.218 port 56217 ssh2
...
2020-09-18 19:14:27
43.229.153.13 attackspam
IP blocked
2020-09-18 19:17:19
116.1.180.22 attackspam
Sep 18 10:14:50 OPSO sshd\[15291\]: Invalid user ftpuser from 116.1.180.22 port 57134
Sep 18 10:14:50 OPSO sshd\[15291\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.1.180.22
Sep 18 10:14:53 OPSO sshd\[15291\]: Failed password for invalid user ftpuser from 116.1.180.22 port 57134 ssh2
Sep 18 10:19:35 OPSO sshd\[16179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.1.180.22  user=root
Sep 18 10:19:37 OPSO sshd\[16179\]: Failed password for root from 116.1.180.22 port 34232 ssh2
2020-09-18 19:29:40
118.24.104.55 attackspambots
2020-09-18T09:22:54.416834dmca.cloudsearch.cf sshd[9442]: Invalid user NetLinx from 118.24.104.55 port 53498
2020-09-18T09:22:54.422498dmca.cloudsearch.cf sshd[9442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.104.55
2020-09-18T09:22:54.416834dmca.cloudsearch.cf sshd[9442]: Invalid user NetLinx from 118.24.104.55 port 53498
2020-09-18T09:22:56.146870dmca.cloudsearch.cf sshd[9442]: Failed password for invalid user NetLinx from 118.24.104.55 port 53498 ssh2
2020-09-18T09:28:52.206332dmca.cloudsearch.cf sshd[9642]: Invalid user ranger from 118.24.104.55 port 59882
2020-09-18T09:28:52.209570dmca.cloudsearch.cf sshd[9642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.104.55
2020-09-18T09:28:52.206332dmca.cloudsearch.cf sshd[9642]: Invalid user ranger from 118.24.104.55 port 59882
2020-09-18T09:28:53.748163dmca.cloudsearch.cf sshd[9642]: Failed password for invalid user ranger from 118.24.10
...
2020-09-18 19:13:51
106.54.194.77 attackbotsspam
Sep 18 13:10:31 ip106 sshd[2043]: Failed password for root from 106.54.194.77 port 55904 ssh2
...
2020-09-18 19:43:22
89.19.180.87 attack
Unauthorized connection attempt from IP address 89.19.180.87 on Port 445(SMB)
2020-09-18 19:45:53
180.253.165.24 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-18 19:24:42
128.70.114.12 attackbots
$f2bV_matches
2020-09-18 19:42:18
128.199.247.130 attack
Brute-force attempt banned
2020-09-18 19:24:07

Recently Reported IPs

81.23.150.181 188.116.17.193 43.227.135.230 29.114.106.171
14.232.58.68 103.143.108.151 177.175.203.247 94.25.228.147
115.76.49.204 85.132.18.3 124.81.68.99 45.142.203.125
27.255.2.10 180.246.75.7 101.23.36.37 172.55.72.181
111.199.24.98 93.122.192.42 126.131.122.39 21.232.201.58