Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Zurich

Region: Zurich

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
46.19.139.34 attack
1 attempts against mh-modsecurity-ban on hail
2020-07-09 03:49:36
46.19.139.34 attackbotsspam
1 attempts against mh-modsecurity-ban on pluto
2020-07-04 23:40:38
46.19.139.34 attackbotsspam
2 attempts against mh-modsecurity-ban on flow
2020-06-20 23:57:07
46.19.139.34 attackbotsspam
1 attempts against mh-modsecurity-ban on sun
2020-06-14 12:00:47
46.19.139.34 attackbots
1 attempts against mh-modsecurity-ban on pluto
2020-06-09 21:24:02
46.19.139.34 attack
1 attempts against mh-modsecurity-ban on lake
2020-06-08 08:26:39
46.19.139.34 attackspambots
1 attempts against mh-modsecurity-ban on train
2020-06-01 01:20:15
46.19.139.34 attackbots
1 attempts against mh-modsecurity-ban on hail
2020-05-30 14:19:42
46.19.139.34 attack
1 attempts against mh-modsecurity-ban on pluto
2020-05-27 21:30:21
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 46.19.139.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41637
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;46.19.139.42.			IN	A

;; AUTHORITY SECTION:
.			266	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022050300 1800 900 604800 86400

;; Query time: 88 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 03 16:41:14 CST 2022
;; MSG SIZE  rcvd: 105
Host info
42.139.19.46.in-addr.arpa domain name pointer hostedby.privatelayer.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.139.19.46.in-addr.arpa	name = hostedby.privatelayer.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
195.14.170.50 attackspam
SIP/5060 Probe, BF, Hack -
2020-08-24 23:04:27
193.27.229.181 attackbots
[H1.VM10] Blocked by UFW
2020-08-24 23:07:46
195.54.160.183 attackspam
2020-08-24T11:07:15.9735541495-001 sshd[59388]: Invalid user admin from 195.54.160.183 port 28522
2020-08-24T11:07:17.6580601495-001 sshd[59388]: Failed password for invalid user admin from 195.54.160.183 port 28522 ssh2
2020-08-24T11:07:18.6635531495-001 sshd[59392]: Invalid user admin from 195.54.160.183 port 46885
2020-08-24T11:07:18.8001891495-001 sshd[59392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.54.160.183
2020-08-24T11:07:18.6635531495-001 sshd[59392]: Invalid user admin from 195.54.160.183 port 46885
2020-08-24T11:07:20.9523301495-001 sshd[59392]: Failed password for invalid user admin from 195.54.160.183 port 46885 ssh2
...
2020-08-24 23:31:31
213.197.65.45 attack
Automatic report - XMLRPC Attack
2020-08-24 23:01:02
51.83.139.56 attackspambots
Aug 24 17:29:43 prod4 sshd\[17741\]: Failed password for root from 51.83.139.56 port 36913 ssh2
Aug 24 17:29:46 prod4 sshd\[17741\]: Failed password for root from 51.83.139.56 port 36913 ssh2
Aug 24 17:29:48 prod4 sshd\[17741\]: Failed password for root from 51.83.139.56 port 36913 ssh2
...
2020-08-24 23:30:15
195.176.3.24 attack
(imapd) Failed IMAP login from 195.176.3.24 (CH/Switzerland/tor5e3.digitale-gesellschaft.ch): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Aug 24 16:20:03 ir1 dovecot[3110802]: imap-login: Disconnected (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=195.176.3.24, lip=5.63.12.44, TLS, session=<5qzGL56t+Z/DsAMY>
2020-08-24 23:18:19
61.145.177.158 attackspambots
firewall-block, port(s): 1433/tcp
2020-08-24 23:24:32
185.23.200.223 attackbots
firewall-block, port(s): 3385/tcp, 3392/tcp
2020-08-24 23:12:35
206.189.188.218 attackbotsspam
SIP/5060 Probe, BF, Hack -
2020-08-24 23:00:23
193.118.53.212 attack
 TCP (SYN) 193.118.53.212:21383 -> port 80, len 44
2020-08-24 23:02:57
162.142.125.21 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-08-24 23:19:08
167.71.130.153 attack
167.71.130.153 - - [24/Aug/2020:14:10:14 +0100] "POST /wp-login.php HTTP/1.1" 200 1874 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.71.130.153 - - [24/Aug/2020:14:10:14 +0100] "POST /wp-login.php HTTP/1.1" 200 1877 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.71.130.153 - - [24/Aug/2020:14:10:14 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-24 23:21:25
14.161.27.203 attack
Dovecot Invalid User Login Attempt.
2020-08-24 23:33:50
190.32.70.23 attack
DATE:2020-08-24 13:49:38, IP:190.32.70.23, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-08-24 23:27:41
80.6.35.239 attackbots
CMS (WordPress or Joomla) login attempt.
2020-08-24 23:36:34

Recently Reported IPs

62.115.37.19 55.193.199.164 3.76.14.65 217.218.188.177
143.79.244.128 174.20.132.148 174.127.195.217 174.127.195.214
193.179.226.220 135.84.83.74 196.190.130.112 94.16.113.55
45.156.31.241 67.5.21.68 185.63.153.182 191.125.188.141
103.88.72.2 103.88.72.175 200.74.91.2 93.141.80.36