Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
39.109.104.217 attackspambots
HK_APNIC-HM_<177>1590724154 [1:2403340:57599] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 21 [Classification: Misc Attack] [Priority: 2]:  {TCP} 39.109.104.217:41030
2020-05-29 18:20:30
39.109.104.217 attackbots
Port probing on unauthorized port 3389
2020-05-25 07:22:26
39.109.104.122 attack
Nov  6 23:33:36 game-panel sshd[19144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.109.104.122
Nov  6 23:33:37 game-panel sshd[19144]: Failed password for invalid user ax400 from 39.109.104.122 port 58254 ssh2
Nov  6 23:38:07 game-panel sshd[19296]: Failed password for root from 39.109.104.122 port 49678 ssh2
2019-11-07 07:38:45
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 39.109.104.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2973
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;39.109.104.70.			IN	A

;; AUTHORITY SECTION:
.			221	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023053100 1800 900 604800 86400

;; Query time: 94 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 31 21:57:22 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 70.104.109.39.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 70.104.109.39.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
146.88.240.4 attack
146.88.240.4 was recorded 38 times by 6 hosts attempting to connect to the following ports: 123,1701,17,1194,5353,27960,111,19,1604,5683,623,1434. Incident counter (4h, 24h, all-time): 38, 106, 80682
2020-07-06 12:31:13
142.93.215.19 attackbotsspam
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-07-06 12:19:55
54.166.162.195 attack
Failed password for invalid user Guest from 54.166.162.195 port 47936 ssh2
2020-07-06 12:22:45
178.62.33.138 attackbots
Jul  6 06:41:38 PorscheCustomer sshd[1585]: Failed password for root from 178.62.33.138 port 50164 ssh2
Jul  6 06:44:45 PorscheCustomer sshd[1692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.33.138
Jul  6 06:44:48 PorscheCustomer sshd[1692]: Failed password for invalid user partner from 178.62.33.138 port 46996 ssh2
...
2020-07-06 12:56:38
123.58.5.243 attackbots
Jul  6 06:37:30 lnxmysql61 sshd[22765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.58.5.243
2020-07-06 12:44:58
194.187.249.38 attack
Jul  6 13:54:26 localhost sshd[2709503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.187.249.38  user=root
Jul  6 13:54:28 localhost sshd[2709503]: Failed password for root from 194.187.249.38 port 35205 ssh2
...
2020-07-06 12:53:09
177.191.98.34 attack
Hit honeypot r.
2020-07-06 12:53:35
137.74.119.50 attackspam
(sshd) Failed SSH login from 137.74.119.50 (FR/France/50.ip-137-74-119.eu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul  6 05:45:16 elude sshd[6403]: Invalid user engineer from 137.74.119.50 port 41552
Jul  6 05:45:18 elude sshd[6403]: Failed password for invalid user engineer from 137.74.119.50 port 41552 ssh2
Jul  6 05:51:36 elude sshd[7378]: Invalid user user from 137.74.119.50 port 37456
Jul  6 05:51:38 elude sshd[7378]: Failed password for invalid user user from 137.74.119.50 port 37456 ssh2
Jul  6 05:54:54 elude sshd[7868]: Invalid user keith from 137.74.119.50 port 33456
2020-07-06 12:30:40
14.239.227.21 attack
1594007705 - 07/06/2020 05:55:05 Host: 14.239.227.21/14.239.227.21 Port: 445 TCP Blocked
2020-07-06 12:20:37
59.126.148.6 attack
Portscan detected
2020-07-06 12:33:32
222.186.175.150 attackspam
Jul  5 18:46:13 kapalua sshd\[2217\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.150  user=root
Jul  5 18:46:15 kapalua sshd\[2217\]: Failed password for root from 222.186.175.150 port 57254 ssh2
Jul  5 18:46:18 kapalua sshd\[2217\]: Failed password for root from 222.186.175.150 port 57254 ssh2
Jul  5 18:46:22 kapalua sshd\[2217\]: Failed password for root from 222.186.175.150 port 57254 ssh2
Jul  5 18:46:31 kapalua sshd\[2223\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.150  user=root
2020-07-06 12:50:32
129.211.130.66 attack
Jul  6 06:33:46 vps687878 sshd\[8931\]: Failed password for root from 129.211.130.66 port 40406 ssh2
Jul  6 06:36:30 vps687878 sshd\[9184\]: Invalid user sammy from 129.211.130.66 port 57780
Jul  6 06:36:30 vps687878 sshd\[9184\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.130.66
Jul  6 06:36:32 vps687878 sshd\[9184\]: Failed password for invalid user sammy from 129.211.130.66 port 57780 ssh2
Jul  6 06:39:11 vps687878 sshd\[9589\]: Invalid user wuqiang from 129.211.130.66 port 46923
Jul  6 06:39:11 vps687878 sshd\[9589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.130.66
...
2020-07-06 12:55:37
206.51.29.115 attackspam
21 attempts against mh-ssh on flow
2020-07-06 12:39:12
63.83.73.216 attack
2020-07-06 12:43:35
111.229.103.45 attack
Jul  6 05:52:03 localhost sshd\[4976\]: Invalid user evv from 111.229.103.45
Jul  6 05:52:03 localhost sshd\[4976\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.103.45
Jul  6 05:52:05 localhost sshd\[4976\]: Failed password for invalid user evv from 111.229.103.45 port 51218 ssh2
Jul  6 05:55:02 localhost sshd\[5028\]: Invalid user joomla from 111.229.103.45
Jul  6 05:55:02 localhost sshd\[5028\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.103.45
...
2020-07-06 12:21:57

Recently Reported IPs

184.157.120.151 205.209.82.232 236.121.99.151 131.61.238.81
92.241.100.218 104.227.126.197 182.253.163.85 101.128.108.136
46.249.32.42 154.31.178.105 148.72.210.73 202.62.151.6
51.83.75.170 20.24.246.33 103.38.215.104 34.66.9.131
101.35.20.62 185.68.253.120 2409:8030:b:1::1b2 72.68.68.217