Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.164.211.209
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25530
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.164.211.209.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011400 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 14 21:27:40 CST 2025
;; MSG SIZE  rcvd: 108
Host info
209.211.164.109.in-addr.arpa domain name pointer 209.211.164.109.static.wline.lns.sme.cust.swisscom.ch.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
209.211.164.109.in-addr.arpa	name = 209.211.164.109.static.wline.lns.sme.cust.swisscom.ch.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
89.3.236.207 attack
Fail2Ban Ban Triggered
2020-06-20 16:12:00
196.223.170.202 attackspam
20/6/19@23:50:43: FAIL: Alarm-Network address from=196.223.170.202
...
2020-06-20 16:12:53
117.251.66.19 attackspam
20/6/19@23:50:20: FAIL: Alarm-Telnet address from=117.251.66.19
...
2020-06-20 16:24:50
209.126.124.203 attackbotsspam
Invalid user mysqld from 209.126.124.203 port 57538
2020-06-20 16:27:30
65.50.209.87 attackbots
Invalid user x from 65.50.209.87 port 57154
2020-06-20 15:51:20
171.244.26.249 attackspam
Invalid user centos from 171.244.26.249 port 35720
2020-06-20 16:05:12
222.186.30.167 attack
Jun 20 10:25:39 home sshd[29314]: Failed password for root from 222.186.30.167 port 53209 ssh2
Jun 20 10:25:54 home sshd[29332]: Failed password for root from 222.186.30.167 port 22230 ssh2
...
2020-06-20 16:26:23
103.253.113.173 attackspambots
Invalid user tms from 103.253.113.173 port 42837
2020-06-20 16:07:43
194.26.25.11 attackspambots
 TCP (SYN) 194.26.25.11:50285 -> port 6534, len 44
2020-06-20 16:02:49
179.191.123.46 attackspam
Jun 20 09:50:13 * sshd[19468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.191.123.46
Jun 20 09:50:15 * sshd[19468]: Failed password for invalid user sakamoto from 179.191.123.46 port 54441 ssh2
2020-06-20 15:53:09
122.54.147.10 attackbots
20/6/19@23:51:16: FAIL: Alarm-Network address from=122.54.147.10
20/6/19@23:51:17: FAIL: Alarm-Network address from=122.54.147.10
...
2020-06-20 15:50:56
111.161.74.100 attackspambots
Invalid user llb from 111.161.74.100 port 45825
2020-06-20 15:52:51
91.251.235.72 attack
Email rejected due to spam filtering
2020-06-20 15:47:30
113.214.25.170 attackbotsspam
Invalid user daxia from 113.214.25.170 port 60685
2020-06-20 15:57:58
177.66.103.164 attackspambots
port scan and connect, tcp 80 (http)
2020-06-20 16:00:56

Recently Reported IPs

91.61.0.23 247.158.158.66 216.147.68.153 132.36.49.88
104.247.83.53 49.140.148.118 127.99.143.103 101.189.190.148
198.131.71.43 203.140.190.83 175.168.13.47 210.10.84.154
175.11.135.75 245.13.138.238 81.225.160.104 3.209.36.169
27.156.153.155 250.10.97.84 250.117.141.144 255.46.167.22