Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Italy

Internet Service Provider: Vodafone Italia S.p.A.

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.117.136.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52858
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;109.117.136.215.		IN	A

;; AUTHORITY SECTION:
.			439	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020072100 1800 900 604800 86400

;; Query time: 80 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jul 21 20:41:50 CST 2020
;; MSG SIZE  rcvd: 119
Host info
215.136.117.109.in-addr.arpa domain name pointer net-109-117-136-215.cust.vodafonedsl.it.
215.136.117.109.in-addr.arpa domain name pointer net-109-117-136-215.cust.dsl.vodafone.it.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
215.136.117.109.in-addr.arpa	name = net-109-117-136-215.cust.dsl.vodafone.it.
215.136.117.109.in-addr.arpa	name = net-109-117-136-215.cust.vodafonedsl.it.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
203.205.37.233 attackbotsspam
...
2020-09-12 18:46:49
218.28.238.162 attackbotsspam
SSH Invalid Login
2020-09-12 18:52:43
134.122.111.162 attackspam
2020-09-12T10:15:45.667957abusebot-8.cloudsearch.cf sshd[2764]: Invalid user oracle from 134.122.111.162 port 35602
2020-09-12T10:15:45.674979abusebot-8.cloudsearch.cf sshd[2764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.111.162
2020-09-12T10:15:45.667957abusebot-8.cloudsearch.cf sshd[2764]: Invalid user oracle from 134.122.111.162 port 35602
2020-09-12T10:15:47.432241abusebot-8.cloudsearch.cf sshd[2764]: Failed password for invalid user oracle from 134.122.111.162 port 35602 ssh2
2020-09-12T10:19:22.723337abusebot-8.cloudsearch.cf sshd[2773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.111.162  user=root
2020-09-12T10:19:24.601488abusebot-8.cloudsearch.cf sshd[2773]: Failed password for root from 134.122.111.162 port 50082 ssh2
2020-09-12T10:23:11.046915abusebot-8.cloudsearch.cf sshd[2834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13
...
2020-09-12 18:25:38
45.7.138.40 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 27 - port: 15095 proto: tcp cat: Misc Attackbytes: 60
2020-09-12 18:43:48
189.216.164.219 attackbotsspam
Delivery of junk email to SMTP.
2020-09-12 18:17:27
74.120.14.18 attackbotsspam
 TCP (SYN) 74.120.14.18:14342 -> port 3306, len 44
2020-09-12 18:41:24
94.129.85.10 attack
1599842996 - 09/11/2020 18:49:56 Host: 94.129.85.10/94.129.85.10 Port: 445 TCP Blocked
2020-09-12 18:45:43
179.210.168.98 attackspam
Automatic report - Banned IP Access
2020-09-12 18:51:38
185.234.218.82 attackbots
Sep 12 10:31:04 mail postfix/smtpd\[32649\]: warning: unknown\[185.234.218.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep 12 11:08:40 mail postfix/smtpd\[2660\]: warning: unknown\[185.234.218.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep 12 11:46:16 mail postfix/smtpd\[4192\]: warning: unknown\[185.234.218.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep 12 12:23:38 mail postfix/smtpd\[5493\]: warning: unknown\[185.234.218.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-09-12 18:39:05
64.57.253.25 attackspambots
...
2020-09-12 18:46:16
186.93.106.66 attack
Brute forcing RDP port 3389
2020-09-12 18:19:55
165.22.70.101 attackbots
TCP port : 16679
2020-09-12 18:53:29
190.210.231.34 attackspambots
...
2020-09-12 18:47:23
77.247.181.162 attackbots
$f2bV_matches
2020-09-12 18:31:18
45.226.12.69 attack
Brute forcing RDP port 3389
2020-09-12 18:21:33

Recently Reported IPs

5.119.229.158 216.22.155.125 246.141.248.8 40.106.177.22
127.68.45.175 142.23.130.214 196.249.68.222 2.184.52.204
194.247.16.245 94.29.248.102 42.58.1.166 14.172.210.209
75.60.202.114 117.4.61.225 221.138.160.158 103.52.129.3
67.209.133.145 113.250.229.220 106.198.122.84 103.100.210.69