Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tokyo

Region: Tokyo

Country: Japan

Internet Service Provider: Linode LLC

Hostname: unknown

Organization: Linode, LLC

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackspam
firewall-block, port(s): 80/tcp
2020-08-20 01:45:23
attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/139.162.108.53/ 
 
 US - 1H : (953)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : US 
 NAME ASN : ASN63949 
 
 IP : 139.162.108.53 
 
 CIDR : 139.162.96.0/19 
 
 PREFIX COUNT : 361 
 
 UNIQUE IP COUNT : 488192 
 
 
 ATTACKS DETECTED ASN63949 :  
  1H - 1 
  3H - 10 
  6H - 12 
 12H - 22 
 24H - 24 
 
 DateTime : 2020-03-13 23:39:20 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2020-03-14 09:10:16
attackbotsspam
Port 80 (HTTP) access denied
2020-03-06 05:45:02
attack
UTC: 2019-12-07 port: 80/tcp
2019-12-08 21:07:49
attackbotsspam
Jun 21 09:21:19   DDOS Attack: SRC=139.162.108.53 DST=[Masked] LEN=40 TOS=0x00 PREC=0x00 TTL=50  DF PROTO=TCP SPT=42050 DPT=80 WINDOW=0 RES=0x00 RST URGP=0
2019-06-21 19:13:04
Comments on same subnet:
IP Type Details Datetime
139.162.108.129 attackbots
Icarus honeypot on github
2020-09-01 07:48:04
139.162.108.62 attack
Port scan denied
2020-08-31 18:04:19
139.162.108.129 attackbotsspam
Tried our host z.
2020-08-29 08:30:25
139.162.108.129 attackbotsspam
Icarus honeypot on github
2020-07-24 17:09:30
139.162.108.62 attack
Port scan denied
2020-07-14 01:12:17
139.162.108.129 attackbots
TCP port 3389: Scan and connection
2020-07-13 15:37:12
139.162.108.129 attackbots
Automatic report - Banned IP Access
2020-07-09 15:52:20
139.162.108.62 attackspam
Jul  5 05:52:16 debian-2gb-nbg1-2 kernel: \[16179752.059756\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=139.162.108.62 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=TCP SPT=43236 DPT=8089 WINDOW=65535 RES=0x00 SYN URGP=0
2020-07-05 16:16:02
139.162.108.129 attackspam
TCP port 3389: Scan and connection
2020-06-26 14:33:42
139.162.108.129 attack
Unauthorized connection attempt detected from IP address 139.162.108.129 to port 3306 [T]
2020-06-24 01:49:19
139.162.108.129 attackbots
TCP port 3306: Scan and connection
2020-06-15 13:56:48
139.162.108.129 attack
Automatic report - Banned IP Access
2020-05-06 08:48:20
139.162.108.62 attackbotsspam
Fail2Ban Ban Triggered
2020-04-21 05:50:36
139.162.108.62 attackspambots
Hits on port : 8089
2020-04-05 08:27:10
139.162.108.129 attackbotsspam
scan z
2020-03-28 07:04:41
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.162.108.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19586
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.162.108.53.			IN	A

;; AUTHORITY SECTION:
.			2182	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019040501 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sat Apr 06 09:54:44 +08 2019
;; MSG SIZE  rcvd: 118

Host info
53.108.162.139.in-addr.arpa domain name pointer scan-70.security.ipip.net.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
53.108.162.139.in-addr.arpa	name = scan-70.security.ipip.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
93.91.114.114 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-05 17:01:46
159.89.38.228 attackspambots
$f2bV_matches
2020-09-05 16:50:07
186.208.241.109 attackspambots
04.09.2020 18:47:49 - SMTP Spam without Auth on hMailserver 
Detected by ELinOX-hMail-A2F
2020-09-05 17:09:13
113.89.54.200 attackbots
Unauthorized connection attempt from IP address 113.89.54.200 on Port 445(SMB)
2020-09-05 16:31:57
188.27.43.58 attack
Automatic report - Port Scan Attack
2020-09-05 16:52:45
103.210.237.14 attackbotsspam
Port Scan
...
2020-09-05 16:43:36
168.194.235.251 attackbotsspam
Sep  4 18:47:58 mellenthin postfix/smtpd[29029]: NOQUEUE: reject: RCPT from unknown[168.194.235.251]: 554 5.7.1 Service unavailable; Client host [168.194.235.251] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/168.194.235.251; from= to= proto=ESMTP helo=
2020-09-05 16:59:49
87.101.83.131 attackbots
Unauthorized access detected from black listed ip!
2020-09-05 16:55:15
3.129.248.102 attackbots
port scan and connect, tcp 80 (http)
2020-09-05 16:52:25
107.172.211.38 attackspambots
2020-09-04 11:34:04.535944-0500  localhost smtpd[27058]: NOQUEUE: reject: RCPT from unknown[107.172.211.38]: 554 5.7.1 Service unavailable; Client host [107.172.211.38] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=<00ea9005.powertopic.co>
2020-09-05 16:53:42
148.72.158.151 attackspambots
port
2020-09-05 17:02:37
91.149.213.154 attackbotsspam
Hi,
Hi,

The IP 91.149.213.154 has just been banned by  after
5 attempts against postfix.


Here is more information about 91.149.213.154 :

% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Condhostnameions.
% See hxxp://www.ripe.net/db/support/db-terms-condhostnameions.pdf

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '91.149.213.0 - 91.149.213.255'

% x@x

inetnum:        91.149.213.0 - 91.149.213.255
org:            ORG-IB111-RIPE
netname:        IPV4-BUYERS-NET
country:        PL
admin-c:        ACRO23711-RIPE
tech-c:         ACRO23711-RIPE
mnt-domains:    MARTON-MNT
mnt-domains:    IPV4BUYERS
mnt-routes:     MARTON-MNT
mnt-routes:     IPV4MNT
status:         ASSIGNED PA
mnt-by:         MARTON-MNT
created:        2007-05-29T09:22:33Z
last-modified:  2020-07-02T08:54:59Z
source:         RIPE

organisation:   ........
------------------------------
2020-09-05 16:51:43
218.206.186.216 attackbots
Fail2Ban Ban Triggered
2020-09-05 16:59:20
118.24.82.81 attackspam
Invalid user operatore from 118.24.82.81 port 61443
2020-09-05 17:05:32
125.99.173.162 attackspambots
Sep  5 09:15:49 rotator sshd\[12979\]: Invalid user linux from 125.99.173.162Sep  5 09:15:51 rotator sshd\[12979\]: Failed password for invalid user linux from 125.99.173.162 port 18176 ssh2Sep  5 09:20:36 rotator sshd\[13758\]: Invalid user service from 125.99.173.162Sep  5 09:20:38 rotator sshd\[13758\]: Failed password for invalid user service from 125.99.173.162 port 9355 ssh2Sep  5 09:25:35 rotator sshd\[14539\]: Invalid user auditor from 125.99.173.162Sep  5 09:25:37 rotator sshd\[14539\]: Failed password for invalid user auditor from 125.99.173.162 port 29231 ssh2
...
2020-09-05 16:53:10

Recently Reported IPs

142.93.60.157 162.243.59.16 89.46.235.200 85.93.91.149
104.248.148.98 93.186.251.226 213.136.80.74 209.250.238.92
108.53.62.148 186.167.16.121 40.112.68.166 35.241.251.180
77.81.237.43 14.234.195.38 95.179.142.113 116.203.55.10
45.127.198.252 35.245.38.181 142.93.98.245 81.15.218.220