Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: Linode LLC

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackbots
 TCP (SYN) 139.162.113.212:36661 -> port 25, len 44
2020-08-17 15:32:00
attackspambots
firewall-block, port(s): 25/tcp
2020-08-02 16:23:12
attack
 TCP (SYN) 139.162.113.212:55812 -> port 25, len 40
2020-07-18 00:25:37
attackspam
 TCP (SYN) 139.162.113.212:43496 -> port 25, len 44
2020-06-03 18:14:04
attackspam
Apr 24 05:54:50 debian-2gb-nbg1-2 kernel: \[9959436.853490\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=139.162.113.212 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=TCP SPT=57476 DPT=25 WINDOW=65535 RES=0x00 SYN URGP=0
2020-04-24 14:31:28
attackbotsspam
IP: 139.162.113.212
Ports affected
    Simple Mail Transfer (25) 
Abuse Confidence rating 100%
Found in DNSBL('s)
ASN Details
   AS63949 Linode LLC
   Japan (JP)
   CIDR 139.162.0.0/16
Log Date: 4/04/2020 11:24:37 PM UTC
2020-04-05 08:26:39
attack
Port 26 (SMTP) access denied
2020-03-06 05:53:38
attackspambots
spam
2020-02-29 17:32:33
attack
unauthorized connection attempt
2020-02-09 16:04:57
attack
Port 26 (SMTP) access denied
2020-01-24 18:33:28
attackspambots
firewall-block, port(s): 25/tcp
2020-01-14 08:42:49
attackbotsspam
UTC: 2019-11-22 port: 25/tcp
2019-11-23 19:52:24
attackspambots
proto=tcp  .  spt=52438  .  dpt=25  .     ((FROM: scan-40.security.ipip.net))     (355)
2019-11-14 22:28:47
attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-17 21:01:24
attackspam
1 pkts, ports: TCP:25
2019-10-06 07:37:07
Comments on same subnet:
IP Type Details Datetime
139.162.113.204 attack
From CCTV User Interface Log
...::ffff:139.162.113.204 - - [07/Jul/2020:23:44:18 +0000] "-" 400 179
...
2020-07-08 15:31:04
139.162.113.204 attackspam
port scan and connect, tcp 443 (https)
2020-05-16 02:08:04
139.162.113.204 attack
Unauthorized connection attempt detected from IP address 139.162.113.204 to port 443 [T]
2020-03-30 00:30:51
139.162.113.204 attackspam
Port scan (443/tcp)
2020-02-17 04:14:15
139.162.113.204 attack
[Mon Nov 11 21:37:51.254643 2019] [:error] [pid 715:tid 140006307493632] [client 139.162.113.204:59716] [client 139.162.113.204] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "696"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "103.27.207.197"] [uri "/"] [unique_id "XclyP2H3g7BiAMdC0EfUKQAAAAA"]
...
2019-11-12 04:44:19
139.162.113.204 attackspambots
3389BruteforceFW21
2019-08-03 09:47:41
139.162.113.204 attack
Port scan and direct access per IP instead of hostname
2019-07-28 16:22:09
139.162.113.204 attack
[httpReq only by ip - not DomainName]
[multiweb: req 2 domains(hosts/ip)]
[bad UserAgent]
2019-07-19 21:46:16
139.162.113.204 attackbots
From CCTV User Interface Log
...::ffff:139.162.113.204 - - [04/Jul/2019:18:51:11 +0000] "-" 400 179
...
2019-07-05 11:13:29
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.162.113.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36764
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.162.113.212.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019042801 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Mon Apr 29 11:07:48 +08 2019
;; MSG SIZE  rcvd: 119

Host info
212.113.162.139.in-addr.arpa domain name pointer scan-40.security.ipip.net.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
212.113.162.139.in-addr.arpa	name = scan-40.security.ipip.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
101.109.83.140 attackbots
Apr 16 22:34:15 ArkNodeAT sshd\[13141\]: Invalid user cvsroot from 101.109.83.140
Apr 16 22:34:15 ArkNodeAT sshd\[13141\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.109.83.140
Apr 16 22:34:17 ArkNodeAT sshd\[13141\]: Failed password for invalid user cvsroot from 101.109.83.140 port 51518 ssh2
2020-04-17 04:58:24
190.8.149.146 attackbotsspam
Invalid user hduser from 190.8.149.146 port 60441
2020-04-17 04:18:31
87.110.181.30 attack
$f2bV_matches
2020-04-17 04:19:14
189.133.72.199 attack
Automatic report - Port Scan Attack
2020-04-17 04:19:43
194.26.29.106 attackspam
port
2020-04-17 04:27:10
183.129.229.248 attackspam
04/16/2020-16:34:32.371724 183.129.229.248 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-04-17 04:42:26
141.98.9.156 attackspambots
Apr 16 22:44:52 srv01 sshd[3807]: Invalid user operator from 141.98.9.156 port 36914
Apr 16 22:44:52 srv01 sshd[3807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.156
Apr 16 22:44:52 srv01 sshd[3807]: Invalid user operator from 141.98.9.156 port 36914
Apr 16 22:44:55 srv01 sshd[3807]: Failed password for invalid user operator from 141.98.9.156 port 36914 ssh2
Apr 16 22:44:52 srv01 sshd[3807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.156
Apr 16 22:44:52 srv01 sshd[3807]: Invalid user operator from 141.98.9.156 port 36914
Apr 16 22:44:55 srv01 sshd[3807]: Failed password for invalid user operator from 141.98.9.156 port 36914 ssh2
...
2020-04-17 04:53:03
92.118.38.67 attackspambots
Brute Force attack - banned by Fail2Ban
2020-04-17 04:35:05
212.119.206.74 attackspambots
$f2bV_matches
2020-04-17 04:19:25
167.172.171.234 attackspam
$f2bV_matches
2020-04-17 04:20:08
203.57.227.58 attackspambots
5x Failed Password
2020-04-17 04:46:13
183.82.123.14 attackspambots
Unauthorized connection attempt detected from IP address 183.82.123.14 to port 1433
2020-04-17 04:23:52
203.195.245.13 attack
$f2bV_matches
2020-04-17 04:17:59
109.124.65.86 attackspambots
Apr 16 22:46:34 ks10 sshd[625400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.124.65.86 
Apr 16 22:46:36 ks10 sshd[625400]: Failed password for invalid user eg from 109.124.65.86 port 52138 ssh2
...
2020-04-17 04:47:38
167.71.234.134 attackbots
Apr 16 22:20:10 server sshd[23341]: Failed password for invalid user admin from 167.71.234.134 port 58436 ssh2
Apr 16 22:30:49 server sshd[25628]: Failed password for invalid user ap from 167.71.234.134 port 54576 ssh2
Apr 16 22:34:35 server sshd[26500]: Failed password for invalid user deploy from 167.71.234.134 port 58856 ssh2
2020-04-17 04:35:54

Recently Reported IPs

185.229.243.2 157.55.39.253 121.152.117.68 60.6.223.191
190.69.102.166 185.220.101.35 103.106.242.100 223.255.127.90
145.226.53.4 43.63.141.34 157.245.140.8 186.248.75.23
118.122.124.88 60.178.71.0 184.105.247.243 45.67.14.152
192.42.116.16 89.175.153.158 123.15.58.162 82.200.191.122