Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Frisco

Region: Texas

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.216.139.225
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52260
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;108.216.139.225.		IN	A

;; AUTHORITY SECTION:
.			530	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023013103 1800 900 604800 86400

;; Query time: 86 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 01 08:26:40 CST 2023
;; MSG SIZE  rcvd: 108
Host info
225.139.216.108.in-addr.arpa domain name pointer 108-216-139-225.lightspeed.rcsntx.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
225.139.216.108.in-addr.arpa	name = 108-216-139-225.lightspeed.rcsntx.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.16.202.174 attackspam
SSH authentication failure x 6 reported by Fail2Ban
...
2020-08-04 13:24:19
118.89.245.153 attackspam
118.89.245.153 - - [04/Aug/2020:05:58:49 +0100] "POST /wp-login.php HTTP/1.1" 200 2046 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
118.89.245.153 - - [04/Aug/2020:05:58:54 +0100] "POST /wp-login.php HTTP/1.1" 200 2020 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
118.89.245.153 - - [04/Aug/2020:05:58:57 +0100] "POST /wp-login.php HTTP/1.1" 200 2019 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-04 13:09:14
35.231.211.161 attackspam
$f2bV_matches
2020-08-04 13:09:57
157.230.235.233 attackspam
2020-08-03T22:55:53.240706server.mjenks.net sshd[934742]: Failed password for root from 157.230.235.233 port 57906 ssh2
2020-08-03T22:57:08.263374server.mjenks.net sshd[934872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.235.233  user=root
2020-08-03T22:57:10.311096server.mjenks.net sshd[934872]: Failed password for root from 157.230.235.233 port 52124 ssh2
2020-08-03T22:58:25.269515server.mjenks.net sshd[935027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.235.233  user=root
2020-08-03T22:58:27.220838server.mjenks.net sshd[935027]: Failed password for root from 157.230.235.233 port 46348 ssh2
...
2020-08-04 12:53:02
125.212.218.111 attackbots
E-Mail Spam (RBL) [REJECTED]
2020-08-04 13:07:13
192.232.192.219 attack
www.fahrschule-mihm.de 192.232.192.219 [04/Aug/2020:05:58:28 +0200] "POST /wp-login.php HTTP/1.1" 200 5994 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
www.fahrschule-mihm.de 192.232.192.219 [04/Aug/2020:05:58:29 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4072 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-04 12:51:57
2a00:d680:10:50::59 attack
Auto reported by IDS
2020-08-04 13:04:48
190.203.122.28 attackbotsspam
Port probing on unauthorized port 445
2020-08-04 13:43:27
51.75.16.206 attack
51.75.16.206 - - [04/Aug/2020:05:57:25 +0200] "GET /wp-login.php HTTP/1.1" 200 6398 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.75.16.206 - - [04/Aug/2020:05:57:31 +0200] "POST /wp-login.php HTTP/1.1" 200 6649 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.75.16.206 - - [04/Aug/2020:05:57:35 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-04 13:27:23
212.45.5.162 attackbotsspam
20/8/4@00:53:35: FAIL: Alarm-Network address from=212.45.5.162
20/8/4@00:53:35: FAIL: Alarm-Network address from=212.45.5.162
...
2020-08-04 13:17:20
190.236.7.254 attackbotsspam
(mod_security) mod_security (id:20000005) triggered by 190.236.7.254 (PE/Peru/-): 5 in the last 300 secs
2020-08-04 13:23:10
49.233.85.15 attackspam
Aug  4 05:52:10 nextcloud sshd\[16206\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.85.15  user=root
Aug  4 05:52:12 nextcloud sshd\[16206\]: Failed password for root from 49.233.85.15 port 34454 ssh2
Aug  4 05:58:22 nextcloud sshd\[21929\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.85.15  user=root
2020-08-04 12:54:46
167.99.66.193 attack
Aug  4 00:58:37 NPSTNNYC01T sshd[4572]: Failed password for root from 167.99.66.193 port 33333 ssh2
Aug  4 01:03:00 NPSTNNYC01T sshd[5263]: Failed password for root from 167.99.66.193 port 39305 ssh2
...
2020-08-04 13:15:30
5.182.210.228 attack
5.182.210.228 - - [04/Aug/2020:06:53:35 +0200] "GET /wp-login.php HTTP/1.1" 200 6310 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
5.182.210.228 - - [04/Aug/2020:06:53:36 +0200] "POST /wp-login.php HTTP/1.1" 200 6561 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
5.182.210.228 - - [04/Aug/2020:06:53:36 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-04 13:22:26
119.186.251.163 attackspam
Port scan: Attack repeated for 24 hours
2020-08-04 13:27:02

Recently Reported IPs

232.52.62.3 80.201.49.104 246.95.219.155 173.154.87.128
207.145.70.139 6.52.16.233 16.94.32.255 165.252.170.34
163.229.126.40 158.58.115.218 128.154.245.0 189.137.32.81
165.234.199.143 246.211.109.49 95.31.22.248 169.22.113.164
179.253.26.8 254.108.68.90 8.200.111.117 109.186.95.151