Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Aarhus C

Region: Central Jutland

Country: Denmark

Internet Service Provider: TDC

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.106.132.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3492
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.106.132.109.			IN	A

;; AUTHORITY SECTION:
.			501	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020401 1800 900 604800 86400

;; Query time: 120 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 04:37:59 CST 2020
;; MSG SIZE  rcvd: 117
Host info
109.132.106.2.in-addr.arpa domain name pointer 2-106-132-109-dynamic.dk.customer.tdc.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
109.132.106.2.in-addr.arpa	name = 2-106-132-109-dynamic.dk.customer.tdc.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.232.141.44 attack
Apr  9 21:59:29 ip-172-31-62-245 sshd\[23798\]: Invalid user git from 49.232.141.44\
Apr  9 21:59:30 ip-172-31-62-245 sshd\[23798\]: Failed password for invalid user git from 49.232.141.44 port 64838 ssh2\
Apr  9 22:04:20 ip-172-31-62-245 sshd\[23851\]: Invalid user sandeep from 49.232.141.44\
Apr  9 22:04:22 ip-172-31-62-245 sshd\[23851\]: Failed password for invalid user sandeep from 49.232.141.44 port 62225 ssh2\
Apr  9 22:09:10 ip-172-31-62-245 sshd\[23959\]: Invalid user admin from 49.232.141.44\
2020-04-10 09:32:15
49.158.22.135 attackspam
prod8
...
2020-04-10 09:27:56
129.211.104.34 attackbotsspam
Apr 10 00:50:55 icinga sshd[34692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.104.34 
Apr 10 00:50:57 icinga sshd[34692]: Failed password for invalid user discover from 129.211.104.34 port 59966 ssh2
Apr 10 00:58:07 icinga sshd[45796]: Failed password for root from 129.211.104.34 port 42006 ssh2
...
2020-04-10 09:22:29
206.189.45.234 attackspam
(sshd) Failed SSH login from 206.189.45.234 (SG/Singapore/-): 5 in the last 3600 secs
2020-04-10 09:03:18
103.242.117.181 attackspambots
Apr  9 23:53:47  exim[10872]: [1\52] 1jMf7K-0002pM-2q H=(weigh.doomcart.com) [103.242.117.181] F= rejected after DATA: This message scored 102.4 spam points.
2020-04-10 09:10:26
66.232.63.37 attackspam
Apr  9 23:54:24 debian-2gb-nbg1-2 kernel: \[8728274.624223\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=66.232.63.37 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=48 ID=46300 PROTO=TCP SPT=52893 DPT=8089 WINDOW=47589 RES=0x00 SYN URGP=0
2020-04-10 08:56:39
185.175.93.11 attackbots
[MK-VM5] Blocked by UFW
2020-04-10 09:26:48
77.83.173.235 attackbots
0,19-02/03 [bc02/m07] PostRequest-Spammer scoring: zurich
2020-04-10 09:15:54
216.168.90.218 attack
tried to invade my microsoft account
2020-04-10 09:26:07
198.38.85.175 attackbots
Icarus honeypot on github
2020-04-10 09:23:02
51.178.62.209 attack
This IP tried a criminal access to my Microsoft account..be aware!!
2020-04-10 09:24:29
103.13.58.4 attack
Apr  9 14:44:35 h1637304 sshd[14541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.58.4 
Apr  9 14:44:37 h1637304 sshd[14541]: Failed password for invalid user user from 103.13.58.4 port 56668 ssh2
Apr  9 14:44:37 h1637304 sshd[14541]: Received disconnect from 103.13.58.4: 11: Bye Bye [preauth]
Apr  9 14:46:57 h1637304 sshd[19091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.58.4 
Apr  9 14:46:59 h1637304 sshd[19091]: Failed password for invalid user a1 from 103.13.58.4 port 51894 ssh2
Apr  9 14:47:00 h1637304 sshd[19091]: Received disconnect from 103.13.58.4: 11: Bye Bye [preauth]
Apr  9 14:48:27 h1637304 sshd[19122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.58.4 
Apr  9 14:48:29 h1637304 sshd[19122]: Failed password for invalid user serverson from 103.13.58.4 port 38322 ssh2
Apr  9 14:48:30 h1637304 sshd[19122]: Rec........
-------------------------------
2020-04-10 09:03:46
112.85.42.180 attackspam
2020-04-10T03:13:56.581821librenms sshd[8541]: Failed password for root from 112.85.42.180 port 50914 ssh2
2020-04-10T03:14:00.130389librenms sshd[8541]: Failed password for root from 112.85.42.180 port 50914 ssh2
2020-04-10T03:14:03.565523librenms sshd[8541]: Failed password for root from 112.85.42.180 port 50914 ssh2
...
2020-04-10 09:15:04
139.186.15.254 attack
Apr  9 23:47:58 srv-ubuntu-dev3 sshd[88869]: Invalid user pays from 139.186.15.254
Apr  9 23:47:58 srv-ubuntu-dev3 sshd[88869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.186.15.254
Apr  9 23:47:58 srv-ubuntu-dev3 sshd[88869]: Invalid user pays from 139.186.15.254
Apr  9 23:48:00 srv-ubuntu-dev3 sshd[88869]: Failed password for invalid user pays from 139.186.15.254 port 40618 ssh2
Apr  9 23:50:58 srv-ubuntu-dev3 sshd[89386]: Invalid user accounting from 139.186.15.254
Apr  9 23:50:58 srv-ubuntu-dev3 sshd[89386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.186.15.254
Apr  9 23:50:58 srv-ubuntu-dev3 sshd[89386]: Invalid user accounting from 139.186.15.254
Apr  9 23:50:59 srv-ubuntu-dev3 sshd[89386]: Failed password for invalid user accounting from 139.186.15.254 port 47240 ssh2
Apr  9 23:53:59 srv-ubuntu-dev3 sshd[90026]: Invalid user user0 from 139.186.15.254
...
2020-04-10 09:14:07
59.36.143.3 attack
Apr  9 23:48:54 srv-ubuntu-dev3 sshd[89061]: Invalid user postgres from 59.36.143.3
Apr  9 23:48:54 srv-ubuntu-dev3 sshd[89061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.36.143.3
Apr  9 23:48:54 srv-ubuntu-dev3 sshd[89061]: Invalid user postgres from 59.36.143.3
Apr  9 23:48:56 srv-ubuntu-dev3 sshd[89061]: Failed password for invalid user postgres from 59.36.143.3 port 34422 ssh2
Apr  9 23:51:30 srv-ubuntu-dev3 sshd[89496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.36.143.3  user=root
Apr  9 23:51:32 srv-ubuntu-dev3 sshd[89496]: Failed password for root from 59.36.143.3 port 47835 ssh2
Apr  9 23:54:12 srv-ubuntu-dev3 sshd[90072]: Invalid user postgres from 59.36.143.3
Apr  9 23:54:12 srv-ubuntu-dev3 sshd[90072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.36.143.3
Apr  9 23:54:12 srv-ubuntu-dev3 sshd[90072]: Invalid user postgres from 59.36.1
...
2020-04-10 09:03:05

Recently Reported IPs

129.187.53.51 12.15.96.52 67.113.117.157 65.239.225.247
71.167.134.24 35.89.165.208 123.119.81.206 35.196.21.188
146.14.128.85 212.182.108.2 201.209.235.210 124.120.176.158
219.61.178.132 105.150.229.222 56.35.68.64 72.115.100.98
175.215.22.6 122.128.131.32 93.121.185.40 199.38.151.243