Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Baixa da Banheira

Region: Setubal

Country: Portugal

Internet Service Provider: NOS

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.48.84.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44930
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.48.84.239.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021202 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 12:50:37 CST 2025
;; MSG SIZE  rcvd: 106
Host info
239.84.48.109.in-addr.arpa domain name pointer a109-48-84-239.cpe.netcabo.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
239.84.48.109.in-addr.arpa	name = a109-48-84-239.cpe.netcabo.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
187.189.36.5 attackbots
SSH Brute Force
2019-12-28 15:18:24
181.115.30.159 attackbotsspam
TCP Port Scanning
2019-12-28 14:56:11
179.109.89.168 attackbotsspam
Honeypot attack, port: 23, PTR: 179-109-89-168.i4telecom.com.br.
2019-12-28 14:57:07
58.248.174.116 attackspambots
Honeypot attack, port: 5555, PTR: PTR record not found
2019-12-28 15:10:12
103.225.206.194 attackbotsspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-12-28 15:03:58
156.239.159.138 attackbotsspam
Dec 27 09:43:49 server sshd\[8920\]: Invalid user juve from 156.239.159.138
Dec 27 09:43:49 server sshd\[8920\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.239.159.138 
Dec 27 09:43:51 server sshd\[8920\]: Failed password for invalid user juve from 156.239.159.138 port 51643 ssh2
Dec 28 09:30:07 server sshd\[11064\]: Invalid user thoegersen from 156.239.159.138
Dec 28 09:30:07 server sshd\[11064\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.239.159.138 
...
2019-12-28 14:43:19
51.91.101.222 attack
Dec 28 07:29:59 cavern sshd[31803]: Failed password for root from 51.91.101.222 port 38210 ssh2
2019-12-28 14:48:56
201.155.194.196 attack
Honeypot attack, port: 23, PTR: dsl-201-155-194-196-sta.prod-empresarial.com.mx.
2019-12-28 15:04:27
91.141.182.194 attackspam
[28/Dec/2019:07:29:34 +0100] Web-Request: "GET /wp-login.php", User-Agent: "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1"
2019-12-28 15:09:41
189.240.117.236 attackbots
$f2bV_matches
2019-12-28 14:58:49
24.126.198.9 attackspam
" "
2019-12-28 15:17:59
49.235.52.126 attack
Dec 28 07:29:33 sxvn sshd[1660952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.52.126
2019-12-28 15:11:08
66.249.64.71 attack
Automatic report - Banned IP Access
2019-12-28 14:44:48
92.249.143.33 attackbotsspam
Automatic report - Banned IP Access
2019-12-28 14:56:37
106.13.17.8 attackbots
Dec 28 07:29:49 [host] sshd[21205]: Invalid user 123321 from 106.13.17.8
Dec 28 07:29:49 [host] sshd[21205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.17.8
Dec 28 07:29:51 [host] sshd[21205]: Failed password for invalid user 123321 from 106.13.17.8 port 43106 ssh2
2019-12-28 14:53:32

Recently Reported IPs

246.100.250.97 19.102.223.166 143.52.18.224 42.220.37.116
22.145.55.137 100.218.90.32 71.12.229.211 131.131.49.217
96.48.173.206 74.148.79.90 155.51.27.85 66.37.41.121
135.84.192.124 245.210.196.244 248.76.252.79 64.134.116.15
253.222.25.138 162.181.141.42 103.190.64.20 17.221.84.51