Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Pakistan

Internet Service Provider: Pakistan Telecommunication Company Limited

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attack
1580533057 - 02/01/2020 05:57:37 Host: 39.42.12.219/39.42.12.219 Port: 445 TCP Blocked
2020-02-01 13:59:44
Comments on same subnet:
IP Type Details Datetime
39.42.122.178 attackspambots
Automatic report - Port Scan Attack
2020-08-04 03:56:43
39.42.127.102 attack
Automatic report - Port Scan Attack
2019-08-24 04:38:55
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 39.42.12.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22695
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;39.42.12.219.			IN	A

;; AUTHORITY SECTION:
.			417	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020101 1800 900 604800 86400

;; Query time: 103 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 13:59:40 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 219.12.42.39.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 219.12.42.39.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
58.54.225.49 attackspambots
Jul 26 23:09:54 eola postfix/smtpd[31437]: connect from unknown[58.54.225.49]
Jul 26 23:09:54 eola postfix/smtpd[31439]: connect from unknown[58.54.225.49]
Jul 26 23:09:54 eola postfix/smtpd[31437]: lost connection after CONNECT from unknown[58.54.225.49]
Jul 26 23:09:54 eola postfix/smtpd[31437]: disconnect from unknown[58.54.225.49] commands=0/0
Jul 26 23:09:55 eola postfix/smtpd[31439]: lost connection after AUTH from unknown[58.54.225.49]
Jul 26 23:09:55 eola postfix/smtpd[31439]: disconnect from unknown[58.54.225.49] ehlo=1 auth=0/1 commands=1/2
Jul 26 23:09:55 eola postfix/smtpd[31437]: connect from unknown[58.54.225.49]
Jul 26 23:09:56 eola postfix/smtpd[31437]: lost connection after AUTH from unknown[58.54.225.49]
Jul 26 23:09:56 eola postfix/smtpd[31437]: disconnect from unknown[58.54.225.49] ehlo=1 auth=0/1 commands=1/2
Jul 26 23:09:56 eola postfix/smtpd[31439]: connect from unknown[58.54.225.49]
Jul 26 23:09:57 eola postfix/smtpd[31439]: lost connection after........
-------------------------------
2019-07-29 09:51:47
58.144.151.8 attackspambots
Jul 27 02:50:19 *** sshd[14228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.144.151.8  user=r.r
Jul 27 02:50:21 *** sshd[14228]: Failed password for r.r from 58.144.151.8 port 36578 ssh2
Jul 27 02:50:21 *** sshd[14228]: Received disconnect from 58.144.151.8: 11: Bye Bye [preauth]
Jul 27 03:08:48 *** sshd[16882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.144.151.8  user=r.r
Jul 27 03:08:50 *** sshd[16882]: Failed password for r.r from 58.144.151.8 port 56428 ssh2
Jul 27 03:08:51 *** sshd[16882]: Received disconnect from 58.144.151.8: 11: Bye Bye [preauth]
Jul 27 03:12:37 *** sshd[17586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.144.151.8  user=r.r
Jul 27 03:12:39 *** sshd[17586]: Failed password for r.r from 58.144.151.8 port 33076 ssh2
Jul 27 03:12:40 *** sshd[17586]: Received disconnect from 58.144.151.8: 11: Bye Bye [preaut........
-------------------------------
2019-07-29 09:57:08
181.15.88.131 attackspambots
Jul 29 02:39:31 mail sshd\[27487\]: Failed password for root from 181.15.88.131 port 36172 ssh2
Jul 29 02:58:55 mail sshd\[27834\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.15.88.131  user=root
...
2019-07-29 10:09:34
128.199.249.8 attackspam
xmlrpc attack
2019-07-29 09:53:44
189.163.201.144 attackbots
Jul 26 21:40:45 rb06 sshd[28492]: reveeclipse mapping checking getaddrinfo for dsl-189-163-201-144-dyn.prod-infinhostnameum.com.mx [189.163.201.144] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul 26 21:40:45 rb06 sshd[28492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.163.201.144  user=r.r
Jul 26 21:40:47 rb06 sshd[28492]: Failed password for r.r from 189.163.201.144 port 12313 ssh2
Jul 26 21:40:47 rb06 sshd[28492]: Received disconnect from 189.163.201.144: 11: Bye Bye [preauth]
Jul 26 21:50:42 rb06 sshd[32144]: reveeclipse mapping checking getaddrinfo for dsl-189-163-201-144-dyn.prod-infinhostnameum.com.mx [189.163.201.144] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul 26 21:50:42 rb06 sshd[32144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.163.201.144  user=r.r
Jul 26 
.... truncated .... 

Jul 26 21:40:45 rb06 sshd[28492]: reveeclipse mapping checking getaddrinfo for dsl-189-163-201-........
-------------------------------
2019-07-29 09:37:17
51.38.232.163 attackbotsspam
Jul 29 03:07:43 SilenceServices sshd[6488]: Failed password for root from 51.38.232.163 port 60802 ssh2
Jul 29 03:12:03 SilenceServices sshd[9152]: Failed password for root from 51.38.232.163 port 56322 ssh2
2019-07-29 09:34:02
154.8.209.64 attackspam
Jul 27 05:29:30 v2hgb sshd[19929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.209.64  user=r.r
Jul 27 05:29:33 v2hgb sshd[19929]: Failed password for r.r from 154.8.209.64 port 46982 ssh2
Jul 27 05:29:33 v2hgb sshd[19929]: Received disconnect from 154.8.209.64 port 46982:11: Bye Bye [preauth]
Jul 27 05:29:33 v2hgb sshd[19929]: Disconnected from 154.8.209.64 port 46982 [preauth]
Jul 27 05:45:41 v2hgb sshd[20856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.209.64  user=r.r
Jul 27 05:45:43 v2hgb sshd[20856]: Failed password for r.r from 154.8.209.64 port 58800 ssh2
Jul 27 05:45:43 v2hgb sshd[20856]: Received disconnect from 154.8.209.64 port 58800:11: Bye Bye [preauth]
Jul 27 05:45:43 v2hgb sshd[20856]: Disconnected from 154.8.209.64 port 58800 [preauth]
Jul 27 05:47:27 v2hgb sshd[20961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rho........
-------------------------------
2019-07-29 10:07:38
81.22.45.22 attack
Jul 29 02:20:37 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.22 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=15808 PROTO=TCP SPT=43420 DPT=33372 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-07-29 09:43:52
193.46.24.168 attackspambots
Jul 28 23:42:56 localhost sshd\[6475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.24.168  user=root
Jul 28 23:42:58 localhost sshd\[6475\]: Failed password for root from 193.46.24.168 port 42814 ssh2
Jul 29 00:04:52 localhost sshd\[6788\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.24.168  user=root
...
2019-07-29 09:31:29
188.76.207.150 attackspam
188.76.207.150 - - [28/Jul/2019:23:26:00 +0200] "GET /xmlrpc.php HTTP/1.1" 302 569
...
2019-07-29 09:57:29
179.7.192.221 attackbots
postfix-gen jail [ma]
2019-07-29 09:24:59
220.88.29.106 attackspambots
Jul 27 05:17:24 lhostnameo sshd[14812]: Invalid user com from 220.88.29.106 port 38154
Jul 27 05:17:24 lhostnameo sshd[14812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.88.29.106
Jul 27 05:17:26 lhostnameo sshd[14812]: Failed password for invalid user com from 220.88.29.106 port 38154 ssh2
Jul 27 05:22:48 lhostnameo sshd[16556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.88.29.106  user=r.r
Jul 27 05:22:50 lhostnameo sshd[16556]: Failed password for r.r from 220.88.29.106 port 32864 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=220.88.29.106
2019-07-29 09:58:35
50.239.140.1 attackspambots
Jul 29 02:50:57 ovpn sshd\[27026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.239.140.1  user=root
Jul 29 02:50:59 ovpn sshd\[27026\]: Failed password for root from 50.239.140.1 port 46632 ssh2
Jul 29 03:16:03 ovpn sshd\[31527\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.239.140.1  user=root
Jul 29 03:16:05 ovpn sshd\[31527\]: Failed password for root from 50.239.140.1 port 40570 ssh2
Jul 29 03:20:14 ovpn sshd\[32298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.239.140.1  user=root
2019-07-29 09:46:30
52.227.166.139 attackbots
Jul 29 01:31:00 v22018076622670303 sshd\[27739\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.227.166.139  user=root
Jul 29 01:31:02 v22018076622670303 sshd\[27739\]: Failed password for root from 52.227.166.139 port 36806 ssh2
Jul 29 01:35:45 v22018076622670303 sshd\[27780\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.227.166.139  user=root
...
2019-07-29 09:32:05
103.39.209.8 attackbots
Jul 27 04:43:33 *** sshd[30609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.39.209.8  user=r.r
Jul 27 04:43:36 *** sshd[30609]: Failed password for r.r from 103.39.209.8 port 55024 ssh2
Jul 27 04:43:36 *** sshd[30609]: Received disconnect from 103.39.209.8: 11: Bye Bye [preauth]
Jul 27 05:03:44 *** sshd[1051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.39.209.8  user=r.r
Jul 27 05:03:45 *** sshd[1051]: Failed password for r.r from 103.39.209.8 port 36996 ssh2
Jul 27 05:03:45 *** sshd[1051]: Received disconnect from 103.39.209.8: 11: Bye Bye [preauth]
Jul 27 05:08:08 *** sshd[1744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.39.209.8  user=r.r
Jul 27 05:08:10 *** sshd[1744]: Failed password for r.r from 103.39.209.8 port 46646 ssh2
Jul 27 05:08:11 *** sshd[1744]: Received disconnect from 103.39.209.8: 11: Bye Bye [preauth]
Jul........
-------------------------------
2019-07-29 09:52:59

Recently Reported IPs

93.57.2.82 192.12.30.219 110.30.68.175 109.93.250.91
142.46.93.28 122.178.228.42 125.58.54.117 160.150.182.41
101.176.253.118 18.130.2.242 20.215.75.34 12.133.106.248
8.20.23.158 123.155.85.231 89.38.151.18 177.203.221.115
150.98.106.250 114.178.1.36 110.50.164.30 113.194.51.78