Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 39.104.109.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13915
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;39.104.109.159.			IN	A

;; AUTHORITY SECTION:
.			287	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021122800 1800 900 604800 86400

;; Query time: 135 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 28 15:49:21 CST 2021
;; MSG SIZE  rcvd: 107
Host info
Host 159.109.104.39.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 159.109.104.39.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.212.169.217 attack
"GET /vicidial/admin.php?ADD=140000000000 HTTP/1.1" "-" "-"
2020-06-22 14:06:57
186.225.80.194 attack
$f2bV_matches
2020-06-22 13:37:37
118.25.93.240 attack
Jun 22 06:54:14 santamaria sshd\[29386\]: Invalid user globalflash from 118.25.93.240
Jun 22 06:54:14 santamaria sshd\[29386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.93.240
Jun 22 06:54:16 santamaria sshd\[29386\]: Failed password for invalid user globalflash from 118.25.93.240 port 46086 ssh2
...
2020-06-22 13:46:28
79.142.187.227 attack
Automatic report - XMLRPC Attack
2020-06-22 13:43:32
106.13.34.173 attack
Jun 22 06:15:46 localhost sshd\[22689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.34.173  user=root
Jun 22 06:15:48 localhost sshd\[22689\]: Failed password for root from 106.13.34.173 port 45638 ssh2
Jun 22 06:16:45 localhost sshd\[22752\]: Invalid user test from 106.13.34.173
Jun 22 06:16:45 localhost sshd\[22752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.34.173
Jun 22 06:16:46 localhost sshd\[22752\]: Failed password for invalid user test from 106.13.34.173 port 58126 ssh2
...
2020-06-22 13:38:07
94.25.229.241 attack
20/6/21@23:54:18: FAIL: Alarm-Network address from=94.25.229.241
20/6/21@23:54:19: FAIL: Alarm-Network address from=94.25.229.241
...
2020-06-22 13:36:47
168.232.13.90 attackbotsspam
port scan and connect, tcp 80 (http)
2020-06-22 13:57:33
195.181.175.121 attack
[2020-06-22 01:46:04] NOTICE[1273] chan_sip.c: Registration from '' failed for '195.181.175.121:63668' - Wrong password
[2020-06-22 01:46:04] SECURITY[1288] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-06-22T01:46:04.120-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="8906",SessionID="0x7f31c018ea98",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/195.181.175.121/63668",Challenge="0664e2f2",ReceivedChallenge="0664e2f2",ReceivedHash="67ad7e9bb76516c30c1a66f07034d340"
[2020-06-22 01:54:20] NOTICE[1273] chan_sip.c: Registration from '' failed for '195.181.175.121:64820' - Wrong password
[2020-06-22 01:54:20] SECURITY[1288] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-06-22T01:54:20.022-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="8915",SessionID="0x7f31c02f97a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/195.181
...
2020-06-22 14:04:48
61.177.172.177 attackspambots
2020-06-22T07:16:31.958136vps751288.ovh.net sshd\[15326\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.177  user=root
2020-06-22T07:16:33.627790vps751288.ovh.net sshd\[15326\]: Failed password for root from 61.177.172.177 port 25690 ssh2
2020-06-22T07:16:36.628108vps751288.ovh.net sshd\[15326\]: Failed password for root from 61.177.172.177 port 25690 ssh2
2020-06-22T07:16:39.789223vps751288.ovh.net sshd\[15326\]: Failed password for root from 61.177.172.177 port 25690 ssh2
2020-06-22T07:16:43.987400vps751288.ovh.net sshd\[15326\]: Failed password for root from 61.177.172.177 port 25690 ssh2
2020-06-22 13:29:03
222.186.175.167 attackspam
Jun 22 05:40:43 game-panel sshd[3922]: Failed password for root from 222.186.175.167 port 15294 ssh2
Jun 22 05:40:53 game-panel sshd[3922]: Failed password for root from 222.186.175.167 port 15294 ssh2
Jun 22 05:40:56 game-panel sshd[3922]: Failed password for root from 222.186.175.167 port 15294 ssh2
Jun 22 05:40:56 game-panel sshd[3922]: error: maximum authentication attempts exceeded for root from 222.186.175.167 port 15294 ssh2 [preauth]
2020-06-22 13:42:06
167.114.12.244 attack
Jun 22 06:34:02 rocket sshd[21819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.12.244
Jun 22 06:34:04 rocket sshd[21819]: Failed password for invalid user log from 167.114.12.244 port 57294 ssh2
Jun 22 06:36:55 rocket sshd[22116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.12.244
...
2020-06-22 13:47:29
217.182.169.228 attackspam
SSH brute-force attempt
2020-06-22 13:55:43
190.8.149.148 attack
2020-06-22T05:34:31.757965shield sshd\[8374\]: Invalid user asteriskpbx from 190.8.149.148 port 41015
2020-06-22T05:34:31.761614shield sshd\[8374\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.8.149.148
2020-06-22T05:34:33.365554shield sshd\[8374\]: Failed password for invalid user asteriskpbx from 190.8.149.148 port 41015 ssh2
2020-06-22T05:39:01.907928shield sshd\[8857\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.8.149.148  user=root
2020-06-22T05:39:03.913147shield sshd\[8857\]: Failed password for root from 190.8.149.148 port 41634 ssh2
2020-06-22 13:50:27
75.132.243.76 attack
Port Scan detected!
...
2020-06-22 13:31:10
213.226.112.61 attackbots
Jun 21 19:24:13 hanapaa sshd\[332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.226.112.61  user=root
Jun 21 19:24:15 hanapaa sshd\[332\]: Failed password for root from 213.226.112.61 port 39916 ssh2
Jun 21 19:27:47 hanapaa sshd\[603\]: Invalid user ben from 213.226.112.61
Jun 21 19:27:47 hanapaa sshd\[603\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.226.112.61
Jun 21 19:27:49 hanapaa sshd\[603\]: Failed password for invalid user ben from 213.226.112.61 port 41400 ssh2
2020-06-22 13:38:32

Recently Reported IPs

150.218.75.106 244.211.143.54 29.24.221.234 73.63.9.97
83.16.237.117 163.60.133.11 140.243.198.223 183.8.22.9
180.183.232.76 249.71.44.47 153.63.253.250 83.242.228.46
83.63.135.102 84.107.252.43 178.48.172.18 238.132.85.195
84.212.242.63 252.102.64.49 84.218.165.63 228.250.109.119