Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.42.139.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19362
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;91.42.139.104.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012800 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 28 19:32:00 CST 2025
;; MSG SIZE  rcvd: 106
Host info
104.139.42.91.in-addr.arpa domain name pointer p5b2a8b68.dip0.t-ipconnect.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
104.139.42.91.in-addr.arpa	name = p5b2a8b68.dip0.t-ipconnect.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
89.107.139.49 attackbots
Unauthorized connection attempt from IP address 89.107.139.49 on Port 445(SMB)
2020-08-02 08:06:59
81.209.177.145 attackspambots
WordPress brute force
2020-08-02 07:42:09
45.139.221.89 attack
From devolvido@melhordomercado.live Sat Aug 01 17:46:07 2020
Received: from mercmx3.melhordomercado.live ([45.139.221.89]:33523)
2020-08-02 07:51:50
218.92.0.224 attack
2020-08-01T18:53:50.739540correo.[domain] sshd[34493]: Failed password for root from 218.92.0.224 port 25649 ssh2 2020-08-01T18:53:55.296736correo.[domain] sshd[34493]: Failed password for root from 218.92.0.224 port 25649 ssh2 2020-08-01T18:53:58.822984correo.[domain] sshd[34493]: Failed password for root from 218.92.0.224 port 25649 ssh2 ...
2020-08-02 07:49:00
34.71.129.32 attack
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-08-01T23:42:24Z and 2020-08-01T23:45:17Z
2020-08-02 07:52:21
64.225.70.13 attack
Fail2Ban Ban Triggered
2020-08-02 07:33:01
1.186.57.150 attackspam
Aug  1 23:16:11 rush sshd[3102]: Failed password for root from 1.186.57.150 port 37154 ssh2
Aug  1 23:20:24 rush sshd[3157]: Failed password for root from 1.186.57.150 port 46468 ssh2
...
2020-08-02 07:39:12
64.111.117.101 attackbots
Attempting to access Wordpress login on a honeypot or private system.
2020-08-02 07:50:47
93.160.175.154 attack
WordPress brute force
2020-08-02 07:36:36
2.139.253.139 attackspambots
Unauthorized connection attempt from IP address 2.139.253.139 on Port 445(SMB)
2020-08-02 08:12:40
52.183.253.220 attack
WordPress brute force
2020-08-02 07:57:43
106.54.182.239 attackbotsspam
SSH Invalid Login
2020-08-02 07:43:57
153.126.152.153 attack
Bruteforce detected by fail2ban
2020-08-02 07:54:25
164.163.1.126 attackspam
20/8/1@18:12:13: FAIL: Alarm-Network address from=164.163.1.126
20/8/1@18:12:13: FAIL: Alarm-Network address from=164.163.1.126
...
2020-08-02 07:47:13
194.44.38.208 attackbots
Attempted connection to port 445.
2020-08-02 08:12:55

Recently Reported IPs

251.117.212.88 64.54.156.83 63.193.58.170 161.10.190.36
163.138.73.209 186.93.76.254 175.108.164.199 134.199.199.142
53.140.20.142 157.153.18.91 151.245.242.53 18.100.127.143
125.48.205.206 177.110.252.185 162.24.32.76 63.40.146.107
67.91.1.127 104.3.205.34 203.243.201.195 223.153.98.139