Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: Linode LLC

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
Unauthorised access (Aug 27) SRC=139.162.110.42 LEN=40 TTL=246 ID=54321 TCP DPT=3306 WINDOW=65535 SYN 
Unauthorised access (Aug 25) SRC=139.162.110.42 LEN=40 TOS=0x10 PREC=0x40 TTL=239 ID=54321 TCP DPT=3306 WINDOW=65535 SYN 
Unauthorised access (Aug 23) SRC=139.162.110.42 LEN=40 TOS=0x10 PREC=0x40 TTL=239 ID=54321 TCP DPT=3306 WINDOW=65535 SYN
2020-08-28 01:27:49
attackspam
04/02/2020-08:40:57.046533 139.162.110.42 Protocol: 6 ET SCAN Suspicious inbound to mySQL port 3306
2020-04-03 04:11:20
attackspambots
firewall-block, port(s): 3306/tcp
2020-03-06 05:49:35
attackbotsspam
suspicious action Fri, 21 Feb 2020 10:16:34 -0300
2020-02-22 00:54:40
attack
Dec 23 21:06:13 debian-2gb-nbg1-2 kernel: \[784316.837388\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=139.162.110.42 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=TCP SPT=40043 DPT=3306 WINDOW=65535 RES=0x00 SYN URGP=0
2019-12-24 04:21:41
attack
Unauthorised access (Dec  4) SRC=139.162.110.42 LEN=40 TTL=240 ID=54321 TCP DPT=3306 WINDOW=65535 SYN
2019-12-04 16:31:55
attackbots
firewall-block, port(s): 3306/tcp
2019-11-22 16:47:28
attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-19 18:44:08
attack
firewall-block, port(s): 3306/tcp
2019-11-17 05:20:44
attackbots
Unauthorized connection attempt from IP address 139.162.110.42 on Port 3306(MYSQL)
2019-10-16 01:10:00
attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-17 19:34:29
attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-14 17:27:34
attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-07 04:06:29
attackbotsspam
[MySQL inject/portscan] tcp/3306
*(RWIN=65535)(08050931)
2019-08-05 18:58:51
Comments on same subnet:
IP Type Details Datetime
139.162.110.210 attack
1586789406 - 04/13/2020 16:50:06 Host: 139.162.110.210/139.162.110.210 Port: 513 TCP Blocked
2020-04-13 23:43:16
139.162.110.210 attackspam
trying to access non-authorized port
2020-04-13 16:23:39
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.162.110.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36507
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.162.110.42.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019042801 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Mon Apr 29 11:09:03 +08 2019
;; MSG SIZE  rcvd: 118

Host info
42.110.162.139.in-addr.arpa domain name pointer scan-31.security.ipip.net.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
42.110.162.139.in-addr.arpa	name = scan-31.security.ipip.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
188.166.16.36 attackspam
Sep 29 22:24:38 ovpn sshd\[15492\]: Invalid user guest from 188.166.16.36
Sep 29 22:24:38 ovpn sshd\[15492\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.16.36
Sep 29 22:24:39 ovpn sshd\[15492\]: Failed password for invalid user guest from 188.166.16.36 port 30426 ssh2
Sep 29 22:35:05 ovpn sshd\[18050\]: Invalid user guestguest from 188.166.16.36
Sep 29 22:35:05 ovpn sshd\[18050\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.16.36
2020-09-30 05:29:17
165.22.113.66 attackspambots
prod8
...
2020-09-30 05:20:10
202.153.37.194 attackbots
2020-09-29T15:08:01.4448881495-001 sshd[16058]: Invalid user new from 202.153.37.194 port 3762
2020-09-29T15:08:03.4532401495-001 sshd[16058]: Failed password for invalid user new from 202.153.37.194 port 3762 ssh2
2020-09-29T15:12:37.3894801495-001 sshd[16230]: Invalid user kathi from 202.153.37.194 port 64333
2020-09-29T15:12:37.3934361495-001 sshd[16230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.153.37.194
2020-09-29T15:12:37.3894801495-001 sshd[16230]: Invalid user kathi from 202.153.37.194 port 64333
2020-09-29T15:12:39.2880801495-001 sshd[16230]: Failed password for invalid user kathi from 202.153.37.194 port 64333 ssh2
...
2020-09-30 05:03:11
217.27.117.136 attack
Invalid user db2fenc1 from 217.27.117.136 port 50340
2020-09-30 05:32:13
31.215.200.164 attackbotsspam
firewall-block, port(s): 445/tcp
2020-09-30 05:05:35
118.24.117.104 attack
Time:     Tue Sep 29 17:19:06 2020 +0000
IP:       118.24.117.104 (CN/China/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 29 17:07:17 48-1 sshd[53494]: Invalid user xxx from 118.24.117.104 port 43924
Sep 29 17:07:20 48-1 sshd[53494]: Failed password for invalid user xxx from 118.24.117.104 port 43924 ssh2
Sep 29 17:16:26 48-1 sshd[53771]: Invalid user sales from 118.24.117.104 port 58130
Sep 29 17:16:29 48-1 sshd[53771]: Failed password for invalid user sales from 118.24.117.104 port 58130 ssh2
Sep 29 17:19:01 48-1 sshd[53849]: Invalid user user from 118.24.117.104 port 58238
2020-09-30 05:04:54
218.39.226.115 attackspambots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-30 05:13:35
151.80.149.223 attackspambots
Sep 29 11:43:30 mail sshd[25696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.149.223 
Sep 29 11:43:33 mail sshd[25696]: Failed password for invalid user cvsroot from 151.80.149.223 port 47094 ssh2
...
2020-09-30 04:59:21
213.14.191.94 attackspam
Automatic report - Port Scan Attack
2020-09-30 04:58:43
144.48.191.180 attack
SQL Injection
2020-09-30 05:18:22
51.15.229.198 attack
$f2bV_matches
2020-09-30 05:24:10
192.254.74.22 attackspambots
192.254.74.22 - - [29/Sep/2020:15:43:21 +0100] "POST /wp-login.php HTTP/1.1" 200 1861 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
192.254.74.22 - - [29/Sep/2020:15:43:22 +0100] "POST /wp-login.php HTTP/1.1" 200 1839 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
192.254.74.22 - - [29/Sep/2020:15:43:23 +0100] "POST /wp-login.php HTTP/1.1" 200 1845 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-30 05:03:48
180.218.224.84 attackspambots
Brute force SMTP login attempted.
...
2020-09-30 05:14:12
167.172.25.74 attackspambots
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-09-29T21:10:07Z and 2020-09-29T21:10:52Z
2020-09-30 05:25:33
218.237.253.167 attackspam
Invalid user friend from 218.237.253.167 port 46699
2020-09-30 05:28:54

Recently Reported IPs

157.55.39.253 121.152.117.68 60.6.223.191 190.69.102.166
185.220.101.35 103.106.242.100 223.255.127.90 145.226.53.4
43.63.141.34 157.245.140.8 186.248.75.23 118.122.124.88
60.178.71.0 184.105.247.243 45.67.14.152 192.42.116.16
89.175.153.158 123.15.58.162 82.200.191.122 5.234.215.52