Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Greece

Internet Service Provider: Cosmote Mobile Telecommunications S.A.

Hostname: unknown

Organization: unknown

Usage Type: Mobile ISP

Comments:
Type Details Datetime
attackspam
Automatic report - Port Scan Attack
2020-05-30 18:07:22
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.210.53.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5295
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;149.210.53.239.			IN	A

;; AUTHORITY SECTION:
.			565	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020053000 1800 900 604800 86400

;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 30 18:07:16 CST 2020
;; MSG SIZE  rcvd: 118
Host info
239.53.210.149.in-addr.arpa domain name pointer 149-210-53-239.mobile.nym.cosmote.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
239.53.210.149.in-addr.arpa	name = 149-210-53-239.mobile.nym.cosmote.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
119.130.229.155 attackbotsspam
Unauthorized connection attempt detected from IP address 119.130.229.155 to port 2220 [J]
2020-01-20 05:42:04
119.28.73.77 attackbots
2020-01-19T21:30:12.917917shield sshd\[29911\]: Invalid user user6 from 119.28.73.77 port 39812
2020-01-19T21:30:12.924136shield sshd\[29911\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.73.77
2020-01-19T21:30:14.425645shield sshd\[29911\]: Failed password for invalid user user6 from 119.28.73.77 port 39812 ssh2
2020-01-19T21:34:00.143067shield sshd\[30545\]: Invalid user gerrard from 119.28.73.77 port 57022
2020-01-19T21:34:00.148357shield sshd\[30545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.73.77
2020-01-20 05:52:06
218.92.0.201 attack
Jan 19 22:12:06 vpn01 sshd[29270]: Failed password for root from 218.92.0.201 port 51467 ssh2
...
2020-01-20 05:39:04
157.245.91.72 attack
Lines containing failures of 157.245.91.72
Jan 17 10:51:30 shared05 sshd[25464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.91.72  user=r.r
Jan 17 10:51:32 shared05 sshd[25464]: Failed password for r.r from 157.245.91.72 port 43058 ssh2
Jan 17 10:51:32 shared05 sshd[25464]: Received disconnect from 157.245.91.72 port 43058:11: Bye Bye [preauth]
Jan 17 10:51:32 shared05 sshd[25464]: Disconnected from authenticating user r.r 157.245.91.72 port 43058 [preauth]
Jan 17 10:56:08 shared05 sshd[26359]: Invalid user anna from 157.245.91.72 port 44602
Jan 17 10:56:08 shared05 sshd[26359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.91.72


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=157.245.91.72
2020-01-20 05:37:54
222.186.30.76 attack
Jan 19 22:40:12 MK-Soft-VM6 sshd[3598]: Failed password for root from 222.186.30.76 port 31121 ssh2
Jan 19 22:40:15 MK-Soft-VM6 sshd[3598]: Failed password for root from 222.186.30.76 port 31121 ssh2
...
2020-01-20 05:40:46
180.250.248.169 attackspambots
Unauthorized connection attempt detected from IP address 180.250.248.169 to port 2220 [J]
2020-01-20 05:41:31
123.188.46.118 attack
" "
2020-01-20 05:37:16
153.37.192.4 attackspambots
Jan 19 18:07:23 firewall sshd[11047]: Invalid user test from 153.37.192.4
Jan 19 18:07:25 firewall sshd[11047]: Failed password for invalid user test from 153.37.192.4 port 57164 ssh2
Jan 19 18:09:11 firewall sshd[11114]: Invalid user rafael from 153.37.192.4
...
2020-01-20 05:21:14
219.134.89.202 attack
Jan 19 18:08:12 firewall sshd[11083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.134.89.202
Jan 19 18:08:12 firewall sshd[11083]: Invalid user sg from 219.134.89.202
Jan 19 18:08:14 firewall sshd[11083]: Failed password for invalid user sg from 219.134.89.202 port 41693 ssh2
...
2020-01-20 05:49:50
41.38.141.6 attackbots
$f2bV_matches
2020-01-20 05:31:19
188.166.232.14 attackbotsspam
WordPress login Brute force / Web App Attack on client site.
2020-01-20 05:19:57
139.59.91.22 attackspam
Jan 19 22:08:06 vpn01 sshd[29170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.91.22
Jan 19 22:08:08 vpn01 sshd[29170]: Failed password for invalid user hosting from 139.59.91.22 port 51236 ssh2
...
2020-01-20 05:54:07
193.112.194.162 attack
Jan 17 10:53:38 zn006 sshd[1623]: Invalid user csgoserver from 193.112.194.162
Jan 17 10:53:38 zn006 sshd[1623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.194.162 
Jan 17 10:53:40 zn006 sshd[1623]: Failed password for invalid user csgoserver from 193.112.194.162 port 43616 ssh2
Jan 17 10:53:40 zn006 sshd[1623]: Received disconnect from 193.112.194.162: 11: Bye Bye [preauth]
Jan 17 10:55:48 zn006 sshd[2066]: Invalid user hath from 193.112.194.162
Jan 17 10:55:49 zn006 sshd[2066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.194.162 
Jan 17 10:55:50 zn006 sshd[2066]: Failed password for invalid user hath from 193.112.194.162 port 57430 ssh2
Jan 17 10:55:50 zn006 sshd[2066]: Received disconnect from 193.112.194.162: 11: Bye Bye [preauth]
Jan 17 10:57:08 zn006 sshd[2137]: Invalid user jeffrey from 193.112.194.162
Jan 17 10:57:08 zn006 sshd[2137]: pam_unix(sshd:auth): aut........
-------------------------------
2020-01-20 05:41:06
49.235.42.177 attackbots
2020-01-19 19:55:51,009 fail2ban.actions        [2870]: NOTICE  [sshd] Ban 49.235.42.177
2020-01-19 20:29:20,596 fail2ban.actions        [2870]: NOTICE  [sshd] Ban 49.235.42.177
2020-01-19 21:01:38,158 fail2ban.actions        [2870]: NOTICE  [sshd] Ban 49.235.42.177
2020-01-19 21:35:12,403 fail2ban.actions        [2870]: NOTICE  [sshd] Ban 49.235.42.177
2020-01-19 22:08:06,036 fail2ban.actions        [2870]: NOTICE  [sshd] Ban 49.235.42.177
...
2020-01-20 05:55:32
37.146.145.206 attackbotsspam
1579468110 - 01/19/2020 22:08:30 Host: 37.146.145.206/37.146.145.206 Port: 445 TCP Blocked
2020-01-20 05:40:31

Recently Reported IPs

223.205.218.160 165.225.60.55 115.79.140.18 94.50.112.142
79.42.65.236 42.226.124.60 191.55.207.45 61.153.47.14
59.23.179.38 202.121.180.2 42.114.13.153 220.170.90.115
203.241.248.18 141.237.109.87 195.54.161.103 31.155.166.33
156.204.8.116 125.167.122.102 58.186.106.104 113.181.41.39