Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: Linode LLC

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackspambots
7415/tcp 10001/tcp 389/tcp...
[2019-08-04/10-04]111pkt,84pt.(tcp)
2019-10-05 08:31:35
attack
Honeypot attack, port: 23, PTR: min-li-usnj-07-31-54989-x-prod.binaryedge.ninja.
2019-09-10 07:19:57
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 172.104.209.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9714
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;172.104.209.139.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051701 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat May 18 05:05:49 CST 2019
;; MSG SIZE  rcvd: 119

Host info
139.209.104.172.in-addr.arpa domain name pointer min-extra-grab-103-usnj-prod.binaryedge.ninja.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
139.209.104.172.in-addr.arpa	name = min-extra-grab-103-usnj-prod.binaryedge.ninja.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
115.231.163.85 attackspam
Invalid user guest from 115.231.163.85 port 51402
2019-11-02 15:38:29
37.195.50.41 attackspambots
Nov  2 07:49:27 DAAP sshd[7032]: Invalid user newlight1 from 37.195.50.41 port 34824
Nov  2 07:49:27 DAAP sshd[7032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.195.50.41
Nov  2 07:49:27 DAAP sshd[7032]: Invalid user newlight1 from 37.195.50.41 port 34824
Nov  2 07:49:29 DAAP sshd[7032]: Failed password for invalid user newlight1 from 37.195.50.41 port 34824 ssh2
...
2019-11-02 15:51:33
59.25.197.158 attackspam
Invalid user training from 59.25.197.158 port 34372
2019-11-02 16:04:30
177.8.244.38 attackbots
$f2bV_matches
2019-11-02 15:58:09
194.182.86.126 attackspam
Nov  2 08:18:35 ns41 sshd[22229]: Failed password for root from 194.182.86.126 port 55530 ssh2
Nov  2 08:24:19 ns41 sshd[22463]: Failed password for root from 194.182.86.126 port 38456 ssh2
2019-11-02 16:00:55
62.210.202.26 attack
Nov  2 04:19:15 core sshd\[8631\]: Invalid user 321 from 62.210.202.26
Nov  2 04:19:16 core sshd\[8634\]: Invalid user wpadmin from 62.210.202.26
Nov  2 04:19:17 core sshd\[8636\]: Invalid user wpadmin123 from 62.210.202.26
Nov  2 04:19:19 core sshd\[8638\]: Invalid user wproot@!@ from 62.210.202.26
Nov  2 04:19:20 core sshd\[8641\]: Invalid user webmail from 62.210.202.26
...
2019-11-02 15:57:52
202.5.37.198 attackspam
postfix (unknown user, SPF fail or relay access denied)
2019-11-02 15:36:07
40.73.29.153 attack
Nov  2 07:59:27 server sshd\[11127\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.29.153  user=root
Nov  2 07:59:29 server sshd\[11127\]: Failed password for root from 40.73.29.153 port 34084 ssh2
Nov  2 08:04:34 server sshd\[12282\]: Invalid user pentaho from 40.73.29.153
Nov  2 08:04:34 server sshd\[12282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.29.153 
Nov  2 08:04:36 server sshd\[12282\]: Failed password for invalid user pentaho from 40.73.29.153 port 47152 ssh2
...
2019-11-02 15:48:31
76.186.197.213 attack
RDP Bruteforce
2019-11-02 15:43:59
27.34.35.94 attackspam
Nov  2 03:48:48 *** sshd[10597]: Invalid user admin from 27.34.35.94
2019-11-02 16:12:54
117.2.120.43 attack
Unauthorised access (Nov  2) SRC=117.2.120.43 LEN=52 TTL=109 ID=7399 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-02 15:40:05
202.75.62.168 attack
wp bruteforce
2019-11-02 15:50:45
47.91.90.132 attack
Nov  2 04:49:40 shamu sshd\[30313\]: Invalid user pgsql from 47.91.90.132
Nov  2 04:49:40 shamu sshd\[30313\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.91.90.132
Nov  2 04:49:41 shamu sshd\[30313\]: Failed password for invalid user pgsql from 47.91.90.132 port 58854 ssh2
2019-11-02 15:40:59
45.45.45.45 attackspambots
02.11.2019 05:02:59 Recursive DNS scan
2019-11-02 15:43:15
119.196.83.18 attack
Invalid user ulka from 119.196.83.18 port 42580
2019-11-02 15:59:49

Recently Reported IPs

230.42.78.172 220.164.2.76 172.160.168.218 139.5.239.17
234.249.51.230 133.89.231.78 50.116.45.41 222.187.254.189
187.210.157.35 59.63.178.12 41.39.47.132 219.159.70.68
24.35.17.144 212.83.163.170 148.167.100.167 180.124.238.230
29.238.220.31 246.49.115.240 177.23.161.203 15.164.198.13