Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hungary

Internet Service Provider: Magyar Telekom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attack
Nov 24 19:30:03 localhost sshd\[25446\]: Invalid user carrol from 46.139.149.132 port 34738
Nov 24 19:30:03 localhost sshd\[25446\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.139.149.132
Nov 24 19:30:05 localhost sshd\[25446\]: Failed password for invalid user carrol from 46.139.149.132 port 34738 ssh2
2019-11-25 02:33:48
attackspam
Aug 18 19:11:30 lnxmail61 sshd[27180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.139.149.132
2019-08-19 04:57:21
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 46.139.149.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51459
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;46.139.149.132.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081801 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Aug 19 04:57:16 CST 2019
;; MSG SIZE  rcvd: 118
Host info
132.149.139.46.in-addr.arpa domain name pointer 2E8B9584.catv.pool.telekom.hu.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
132.149.139.46.in-addr.arpa	name = 2E8B9584.catv.pool.telekom.hu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
76.69.94.118 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-13 00:10:21
72.167.224.135 attackbots
Feb 12 15:40:40 pornomens sshd\[7839\]: Invalid user shao from 72.167.224.135 port 47020
Feb 12 15:40:40 pornomens sshd\[7839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.167.224.135
Feb 12 15:40:42 pornomens sshd\[7839\]: Failed password for invalid user shao from 72.167.224.135 port 47020 ssh2
...
2020-02-12 23:50:22
170.233.47.254 attackbotsspam
W 31101,/var/log/nginx/access.log,-,-
2020-02-12 23:36:18
89.248.162.172 attackspam
Feb1216:38:26server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=89.248.162.172DST=136.243.224.56LEN=40TOS=0x00PREC=0x00TTL=249ID=58264PROTO=TCPSPT=41711DPT=2020WINDOW=1024RES=0x00SYNURGP=0Feb1216:38:31server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=89.248.162.172DST=136.243.224.55LEN=40TOS=0x00PREC=0x00TTL=249ID=51388PROTO=TCPSPT=41710DPT=5252WINDOW=1024RES=0x00SYNURGP=0Feb1216:38:39server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=89.248.162.172DST=136.243.224.58LEN=40TOS=0x00PREC=0x00TTL=249ID=25260PROTO=TCPSPT=41711DPT=43389WINDOW=1024RES=0x00SYNURGP=0Feb1216:38:42server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=89.248.162.172DST=136.243.224.52LEN=40TOS=0x00PREC=0x00TTL=249ID=59366PROTO=TCPSPT=41711DPT=43389WINDOW=1024RES=0x00SYNURGP=0Feb1216:38:46server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:
2020-02-12 23:42:41
31.5.211.16 attackspam
Feb 12 13:09:04 vps46666688 sshd[32012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.5.211.16
Feb 12 13:09:06 vps46666688 sshd[32012]: Failed password for invalid user yw from 31.5.211.16 port 43816 ssh2
...
2020-02-13 00:10:51
112.217.225.61 attack
(sshd) Failed SSH login from 112.217.225.61 (KR/South Korea/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Feb 12 16:19:41 elude sshd[9122]: Invalid user sadao from 112.217.225.61 port 24601
Feb 12 16:19:43 elude sshd[9122]: Failed password for invalid user sadao from 112.217.225.61 port 24601 ssh2
Feb 12 16:32:42 elude sshd[9900]: Invalid user iii from 112.217.225.61 port 40142
Feb 12 16:32:44 elude sshd[9900]: Failed password for invalid user iii from 112.217.225.61 port 40142 ssh2
Feb 12 16:36:22 elude sshd[10143]: Invalid user vm from 112.217.225.61 port 12305
2020-02-13 00:10:01
134.209.203.34 attack
SSH/22 MH Probe, BF, Hack -
2020-02-12 23:47:18
51.68.190.223 attackbotsspam
Feb 12 12:52:09 vps46666688 sshd[31395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.190.223
Feb 12 12:52:11 vps46666688 sshd[31395]: Failed password for invalid user akim from 51.68.190.223 port 46904 ssh2
...
2020-02-13 00:05:58
222.186.20.71 attackspam
Automatic report - Windows Brute-Force Attack
2020-02-13 00:01:01
45.143.222.209 attack
Subject: REQUEST FOR QUOTE
Date: 12 Feb 2020 14:06:26 +0100
Message ID: <20200212140626.DBF8926B3169C326@bombardi.cz>
Virus/Unauthorized code: >>> AVE/Heur.AdvML.B!100-SH in '17858026_6X_AZ_PA4__OBJEDNAT.exe'
2020-02-12 23:51:07
141.98.80.173 attack
2020-02-12T14:52:34.987115abusebot-4.cloudsearch.cf sshd[31969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.80.173  user=root
2020-02-12T14:52:36.699628abusebot-4.cloudsearch.cf sshd[31969]: Failed password for root from 141.98.80.173 port 51281 ssh2
2020-02-12T14:52:37.626090abusebot-4.cloudsearch.cf sshd[31974]: Invalid user admin from 141.98.80.173 port 3202
2020-02-12T14:52:37.658947abusebot-4.cloudsearch.cf sshd[31974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.80.173
2020-02-12T14:52:37.626090abusebot-4.cloudsearch.cf sshd[31974]: Invalid user admin from 141.98.80.173 port 3202
2020-02-12T14:52:39.783089abusebot-4.cloudsearch.cf sshd[31974]: Failed password for invalid user admin from 141.98.80.173 port 3202 ssh2
2020-02-12T14:52:40.861793abusebot-4.cloudsearch.cf sshd[31979]: Invalid user admin from 141.98.80.173 port 41142
...
2020-02-12 23:35:10
103.221.254.70 attack
" "
2020-02-13 00:14:53
122.4.224.8 attackspam
Unauthorized connection attempt from IP address 122.4.224.8 on Port 445(SMB)
2020-02-13 00:15:57
2a01:4f8:201:6390::2 attackbots
20 attempts against mh-misbehave-ban on cedar
2020-02-12 23:59:37
190.131.201.122 attackbots
Unauthorized SSH login attempts
2020-02-13 00:20:40

Recently Reported IPs

43.251.105.206 125.162.167.81 13.230.203.216 88.249.81.54
64.204.209.117 130.160.74.131 96.135.125.177 220.240.14.69
228.66.240.190 93.0.117.113 163.53.61.214 87.205.98.91
177.42.100.65 201.181.220.2 205.233.16.126 215.162.160.30
117.126.213.1 91.2.89.220 212.75.40.159 142.93.218.11