Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hungary

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 46.139.213.173
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16936
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;46.139.213.173.			IN	A

;; AUTHORITY SECTION:
.			393	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 22:47:55 CST 2022
;; MSG SIZE  rcvd: 107
Host info
173.213.139.46.in-addr.arpa domain name pointer 2E8BD5AD.catv.pool.telekom.hu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
173.213.139.46.in-addr.arpa	name = 2E8BD5AD.catv.pool.telekom.hu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
137.74.171.160 attack
Mar 30 03:57:47 ip-172-31-62-245 sshd\[10617\]: Invalid user hsk from 137.74.171.160\
Mar 30 03:57:49 ip-172-31-62-245 sshd\[10617\]: Failed password for invalid user hsk from 137.74.171.160 port 47100 ssh2\
Mar 30 04:02:49 ip-172-31-62-245 sshd\[10646\]: Invalid user radio from 137.74.171.160\
Mar 30 04:02:51 ip-172-31-62-245 sshd\[10646\]: Failed password for invalid user radio from 137.74.171.160 port 58564 ssh2\
Mar 30 04:07:35 ip-172-31-62-245 sshd\[10686\]: Invalid user asdfg from 137.74.171.160\
2020-03-30 12:45:23
114.119.37.143 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-30 12:55:08
180.250.22.69 attackbots
port scan and connect, tcp 22 (ssh)
2020-03-30 13:07:27
80.211.88.70 attack
2020-03-30T06:33:45.108685  sshd[11421]: Invalid user exz from 80.211.88.70 port 56056
2020-03-30T06:33:45.122658  sshd[11421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.88.70
2020-03-30T06:33:45.108685  sshd[11421]: Invalid user exz from 80.211.88.70 port 56056
2020-03-30T06:33:47.119821  sshd[11421]: Failed password for invalid user exz from 80.211.88.70 port 56056 ssh2
...
2020-03-30 12:45:41
27.67.133.19 attackspam
Honeypot attack, port: 445, PTR: localhost.
2020-03-30 12:43:42
157.7.221.124 attackbotsspam
Mar 30 07:59:51 ift sshd\[23657\]: Invalid user rs from 157.7.221.124Mar 30 07:59:54 ift sshd\[23657\]: Failed password for invalid user rs from 157.7.221.124 port 52216 ssh2Mar 30 08:03:37 ift sshd\[24535\]: Invalid user tpgit from 157.7.221.124Mar 30 08:03:40 ift sshd\[24535\]: Failed password for invalid user tpgit from 157.7.221.124 port 58328 ssh2Mar 30 08:07:21 ift sshd\[25168\]: Invalid user ugu from 157.7.221.124
...
2020-03-30 13:11:35
202.43.146.107 attack
" "
2020-03-30 13:13:37
222.186.52.39 attack
Unauthorized connection attempt detected from IP address 222.186.52.39 to port 22
2020-03-30 12:31:53
94.102.56.215 attackspambots
94.102.56.215 was recorded 21 times by 12 hosts attempting to connect to the following ports: 1034,1037,922. Incident counter (4h, 24h, all-time): 21, 121, 9178
2020-03-30 13:02:13
222.186.30.35 attackspam
Mar 30 07:42:51 server2 sshd\[32505\]: User root from 222.186.30.35 not allowed because not listed in AllowUsers
Mar 30 07:45:55 server2 sshd\[345\]: User root from 222.186.30.35 not allowed because not listed in AllowUsers
Mar 30 07:48:39 server2 sshd\[447\]: User root from 222.186.30.35 not allowed because not listed in AllowUsers
Mar 30 07:49:03 server2 sshd\[470\]: User root from 222.186.30.35 not allowed because not listed in AllowUsers
Mar 30 07:49:03 server2 sshd\[455\]: User root from 222.186.30.35 not allowed because not listed in AllowUsers
Mar 30 07:49:03 server2 sshd\[480\]: User root from 222.186.30.35 not allowed because not listed in AllowUsers
2020-03-30 12:52:20
94.236.210.45 attack
Honeypot attack, port: 4567, PTR: PTR record not found
2020-03-30 12:51:01
188.36.125.210 attackbots
Mar 30 07:02:31 * sshd[26667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.36.125.210
Mar 30 07:02:34 * sshd[26667]: Failed password for invalid user nnl from 188.36.125.210 port 34478 ssh2
2020-03-30 13:07:02
222.186.15.10 attackspam
Mar 30 00:37:57 plusreed sshd[18684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.10  user=root
Mar 30 00:37:59 plusreed sshd[18684]: Failed password for root from 222.186.15.10 port 27744 ssh2
...
2020-03-30 12:38:59
54.36.163.141 attackspam
Mar 30 06:54:45 eventyay sshd[9097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.163.141
Mar 30 06:54:46 eventyay sshd[9097]: Failed password for invalid user vce from 54.36.163.141 port 59738 ssh2
Mar 30 06:58:47 eventyay sshd[9180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.163.141
...
2020-03-30 12:59:54
188.166.150.230 attack
$f2bV_matches
2020-03-30 12:48:47

Recently Reported IPs

120.86.252.206 180.149.126.207 81.69.8.183 113.246.24.52
125.47.101.173 182.73.26.30 47.97.65.139 185.102.113.182
164.90.210.186 223.150.214.23 27.47.2.80 123.200.125.49
41.105.96.164 171.109.214.24 46.164.228.234 141.98.81.137
119.236.83.135 180.253.99.7 94.74.172.100 197.53.82.176