Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan, China

Internet Service Provider: Digital United Inc.

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attack
Unauthorized connection attempt detected from IP address 112.104.139.33 to port 445
2020-03-18 01:12:42
Comments on same subnet:
IP Type Details Datetime
112.104.139.234 attackspam
Unauthorized connection attempt from IP address 112.104.139.234 on Port 445(SMB)
2020-02-01 02:12:59
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.104.139.33
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15925
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;112.104.139.33.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020031700 1800 900 604800 86400

;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 18 01:12:22 CST 2020
;; MSG SIZE  rcvd: 118
Host info
33.139.104.112.in-addr.arpa domain name pointer 112-104-139-33.adsl.dynamic.seed.net.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
33.139.104.112.in-addr.arpa	name = 112-104-139-33.adsl.dynamic.seed.net.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.143.72.23 attackbots
2020-07-09 07:33:18 dovecot_login authenticator failed for \(User\) \[185.143.72.23\]: 535 Incorrect authentication data \(set_id=1q2w3e4r5t@org.ua\)2020-07-09 07:33:50 dovecot_login authenticator failed for \(User\) \[185.143.72.23\]: 535 Incorrect authentication data \(set_id=nouveau@org.ua\)2020-07-09 07:34:20 dovecot_login authenticator failed for \(User\) \[185.143.72.23\]: 535 Incorrect authentication data \(set_id=plataforma@org.ua\)
...
2020-07-09 12:38:30
182.61.134.136 attackbots
Icarus honeypot on github
2020-07-09 12:05:10
206.125.144.186 attackspambots
Brute forcing email accounts
2020-07-09 12:27:30
111.229.110.107 attackbots
Jul  9 03:57:47 vps1 sshd[2335882]: Invalid user rong from 111.229.110.107 port 34066
Jul  9 03:57:49 vps1 sshd[2335882]: Failed password for invalid user rong from 111.229.110.107 port 34066 ssh2
...
2020-07-09 12:44:52
118.71.1.228 attackspambots
Honeypot attack, port: 445, PTR: ip-address-pool-xxx.fpt.vn.
2020-07-09 12:12:22
190.111.246.168 attack
Jul  9 05:54:03 dev0-dcde-rnet sshd[24927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.111.246.168
Jul  9 05:54:05 dev0-dcde-rnet sshd[24927]: Failed password for invalid user wjing from 190.111.246.168 port 38497 ssh2
Jul  9 05:57:55 dev0-dcde-rnet sshd[24974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.111.246.168
2020-07-09 12:37:39
101.224.220.14 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-07-09 12:18:38
193.70.38.187 attackbotsspam
k+ssh-bruteforce
2020-07-09 12:33:52
193.32.161.141 attackbotsspam
SmallBizIT.US 6 packets to tcp(10087,10088,10089,46342,46343,46344)
2020-07-09 12:04:44
106.12.215.238 attack
SSH Brute-Force attacks
2020-07-09 12:16:05
105.184.27.120 attackspam
Wordpress attack
2020-07-09 12:45:32
216.6.201.3 attackbotsspam
Jul  9 06:10:27 abendstille sshd\[22643\]: Invalid user ronald from 216.6.201.3
Jul  9 06:10:27 abendstille sshd\[22643\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.6.201.3
Jul  9 06:10:29 abendstille sshd\[22643\]: Failed password for invalid user ronald from 216.6.201.3 port 46675 ssh2
Jul  9 06:13:28 abendstille sshd\[25684\]: Invalid user caresse from 216.6.201.3
Jul  9 06:13:28 abendstille sshd\[25684\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.6.201.3
...
2020-07-09 12:20:15
122.114.15.114 attackbotsspam
SSH login attempts brute force.
2020-07-09 12:26:28
213.248.130.159 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-07-09 12:09:42
200.31.19.206 attackbotsspam
Jul  8 21:57:59 Host-KLAX-C sshd[5923]: Invalid user esets from 200.31.19.206 port 38274
...
2020-07-09 12:31:52

Recently Reported IPs

88.249.120.181 134.175.195.53 196.202.14.251 47.185.44.38
218.161.86.188 127.251.44.235 45.28.38.236 179.95.39.143
223.16.116.240 219.79.236.75 62.172.78.40 51.218.159.253
27.105.182.135 92.240.204.64 121.228.248.18 60.168.206.19
60.167.20.121 116.202.155.140 27.66.74.118 192.236.147.48