Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Finland

Internet Service Provider: unknown

Hostname: unknown

Organization: Telia Finland Oyj

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.216.129.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60900
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.216.129.215.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090501 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Sep 06 01:33:11 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 215.129.216.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 215.129.216.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
198.108.66.208 attack
Unauthorized connection attempt detected from IP address 198.108.66.208 to port 8090
2019-12-29 03:38:42
51.37.166.146 attack
Unauthorized connection attempt detected from IP address 51.37.166.146 to port 26
2019-12-29 03:59:35
58.141.232.44 attackbots
Unauthorized connection attempt detected from IP address 58.141.232.44 to port 23
2019-12-29 03:56:59
190.104.146.28 attackbots
Unauthorized connection attempt detected from IP address 190.104.146.28 to port 5900
2019-12-29 03:42:24
13.52.247.150 attack
Unauthorized connection attempt detected from IP address 13.52.247.150 to port 8008
2019-12-29 04:04:04
188.226.171.36 attackbots
2019-12-28T14:52:14.391293shield sshd\[6694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.226.171.36  user=root
2019-12-28T14:52:15.792972shield sshd\[6694\]: Failed password for root from 188.226.171.36 port 53000 ssh2
2019-12-28T14:55:42.941359shield sshd\[7521\]: Invalid user fritz from 188.226.171.36 port 56564
2019-12-28T14:55:42.945548shield sshd\[7521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.226.171.36
2019-12-28T14:55:45.235283shield sshd\[7521\]: Failed password for invalid user fritz from 188.226.171.36 port 56564 ssh2
2019-12-29 03:43:11
211.192.157.4 attack
Unauthorized connection attempt detected from IP address 211.192.157.4 to port 5555
2019-12-29 03:37:44
66.42.109.211 attack
Unauthorized connection attempt detected from IP address 66.42.109.211 to port 445
2019-12-29 03:30:54
54.245.19.0 attackspam
Unauthorized connection attempt detected from IP address 54.245.19.0 to port 8008
2019-12-29 03:32:06
192.234.192.32 attack
Unauthorized connection attempt detected from IP address 192.234.192.32 to port 443
2019-12-29 03:42:02
79.7.204.241 attack
Unauthorized connection attempt detected from IP address 79.7.204.241 to port 81
2019-12-29 03:52:41
59.9.204.138 attackspambots
Unauthorized connection attempt detected from IP address 59.9.204.138 to port 85
2019-12-29 03:31:48
71.48.58.108 attackbotsspam
Unauthorized connection attempt detected from IP address 71.48.58.108 to port 8080
2019-12-29 03:29:13
34.219.226.51 attack
Unauthorized connection attempt detected from IP address 34.219.226.51 to port 8008
2019-12-29 04:01:18
54.187.98.174 attack
Unauthorized connection attempt detected from IP address 54.187.98.174 to port 8008
2019-12-29 03:58:14

Recently Reported IPs

86.119.134.191 135.140.131.187 31.160.141.31 146.103.228.14
200.38.148.204 31.139.204.7 109.52.234.41 220.49.197.144
51.219.106.126 157.174.137.196 34.117.5.199 44.240.180.27
36.185.199.213 195.6.79.250 23.114.103.231 83.145.171.92
94.146.231.218 221.84.73.131 27.92.193.147 108.234.51.206