Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.15.248.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50627
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.15.248.215.			IN	A

;; AUTHORITY SECTION:
.			298	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 04:05:04 CST 2022
;; MSG SIZE  rcvd: 107
Host info
215.248.15.139.in-addr.arpa domain name pointer rb-p-tt-mybuderus-at-com.bosch.at.
215.248.15.139.in-addr.arpa domain name pointer rb-p-tt-mybuderus-at-www.bosch.at.
215.248.15.139.in-addr.arpa domain name pointer meinbonus.buderus.de.
215.248.15.139.in-addr.arpa domain name pointer heizungstausch.buderus.de.
215.248.15.139.in-addr.arpa domain name pointer remplacementchaudiere.lu.
215.248.15.139.in-addr.arpa domain name pointer kesselaustausch.lu.
215.248.15.139.in-addr.arpa domain name pointer heizungstausch24.de.
215.248.15.139.in-addr.arpa domain name pointer buderus.at.
215.248.15.139.in-addr.arpa domain name pointer fachkunden.buderus.at.
215.248.15.139.in-addr.arpa domain name pointer acx182.bosch.de.
215.248.15.139.in-addr.arpa domain name pointer buderus-zukunft.at.
215.248.15.139.in-addr.arpa domain name pointer buderus-industriekessel.de.
215.248.15.139.in-addr.arpa domain name pointer buderus-garantie.lu.
215.248.15.139.in-addr.arpa domain name pointer buderus-futur.lu.
Nslookup info:
b';; Truncated, retrying in TCP mode.
215.248.15.139.in-addr.arpa	name = buderus-controlcenterconnect.de.
215.248.15.139.in-addr.arpa	name = buderus-futur.lu.
215.248.15.139.in-addr.arpa	name = rb-p-tt-mybuderus-at-com.bosch.at.
215.248.15.139.in-addr.arpa	name = remplacementchaudiere.lu.
215.248.15.139.in-addr.arpa	name = fachkunden.buderus.at.
215.248.15.139.in-addr.arpa	name = rb-p-tt-mybuderus-at-www.bosch.at.
215.248.15.139.in-addr.arpa	name = www.buderus.de.
215.248.15.139.in-addr.arpa	name = buderus.de.
215.248.15.139.in-addr.arpa	name = heizungstausch.buderus.de.
215.248.15.139.in-addr.arpa	name = buderus-industriekessel.de.
215.248.15.139.in-addr.arpa	name = rb-p-tt-mybuderus-at-pro.bosch.at.
215.248.15.139.in-addr.arpa	name = bosch-kundendienst.at.
215.248.15.139.in-addr.arpa	name = buderus-garantie.lu.
215.248.15.139.in-addr.arpa	name = fachkunden.buderus.de.
215.248.15.139.in-addr.arpa	name = buderus-zukunft.at.
215.248.15.139.in-addr.arpa	name = rb-p-tt-mybuderus-de-www.bosch.de.
215.248.15.139.in-addr.arpa	name = heizungstausch24.de.
215.248.15.139.in-addr.arpa	name = rb-p-tt-mybuderus-de-com.bosch.de.
215.248.15.139.in-addr.arpa	name = buderus.at.
215.248.15.139.in-addr.arpa	name = branche.buderus.de.
215.248.15.139.in-addr.arpa	name = rb-p-tt-mybuderus-de-pro.bosch.de.
215.248.15.139.in-addr.arpa	name = meinbonus.buderus.de.
215.248.15.139.in-addr.arpa	name = www.bosch-kundendienst.at.
215.248.15.139.in-addr.arpa	name = acx182.bosch.de.
215.248.15.139.in-addr.arpa	name = kesselaustausch.lu.
215.248.15.139.in-addr.arpa	name = buderus.lu.

Authoritative answers can be found from:

'
Related IP info:
Related comments:
IP Type Details Datetime
171.225.250.230 attackspam
2020-07-17 14:55:44
103.60.212.2 attackspambots
Invalid user admin from 103.60.212.2 port 56930
2020-07-17 15:23:36
109.236.50.200 attackspambots
2020-07-17 15:00:29
129.28.174.147 attack
2020-07-17T08:37:06.443322n23.at sshd[1294084]: Invalid user kira from 129.28.174.147 port 38570
2020-07-17T08:37:08.598351n23.at sshd[1294084]: Failed password for invalid user kira from 129.28.174.147 port 38570 ssh2
2020-07-17T08:43:33.971738n23.at sshd[1298866]: Invalid user kazama from 129.28.174.147 port 38826
...
2020-07-17 15:18:40
36.67.163.146 attackspam
2020-07-17T07:54:56.303097sd-86998 sshd[8868]: Invalid user zhongyang from 36.67.163.146 port 35914
2020-07-17T07:54:56.308601sd-86998 sshd[8868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.67.163.146
2020-07-17T07:54:56.303097sd-86998 sshd[8868]: Invalid user zhongyang from 36.67.163.146 port 35914
2020-07-17T07:54:58.797009sd-86998 sshd[8868]: Failed password for invalid user zhongyang from 36.67.163.146 port 35914 ssh2
2020-07-17T08:04:49.490366sd-86998 sshd[10182]: Invalid user wlf from 36.67.163.146 port 41508
...
2020-07-17 14:53:53
203.143.20.230 attackspambots
Jul 17 08:05:06 dev0-dcde-rnet sshd[16514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.143.20.230
Jul 17 08:05:08 dev0-dcde-rnet sshd[16514]: Failed password for invalid user etri from 203.143.20.230 port 51097 ssh2
Jul 17 08:10:17 dev0-dcde-rnet sshd[16629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.143.20.230
2020-07-17 15:02:45
88.255.240.186 attackbots
SSH BruteForce Attack
2020-07-17 15:20:20
46.21.208.18 attack
failed_logins
2020-07-17 15:04:21
129.204.105.130 attackspam
Invalid user dev from 129.204.105.130 port 59290
2020-07-17 15:17:49
111.72.195.114 attack
Jul 17 08:36:24 srv01 postfix/smtpd\[14370\]: warning: unknown\[111.72.195.114\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 17 08:36:36 srv01 postfix/smtpd\[14370\]: warning: unknown\[111.72.195.114\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 17 08:36:52 srv01 postfix/smtpd\[14370\]: warning: unknown\[111.72.195.114\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 17 08:37:11 srv01 postfix/smtpd\[14370\]: warning: unknown\[111.72.195.114\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 17 08:37:23 srv01 postfix/smtpd\[14370\]: warning: unknown\[111.72.195.114\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-17 14:57:16
121.154.29.190 attack
2020-07-17 14:56:15
185.39.11.105 attackbots
400 BAD REQUEST
2020-07-17 15:21:02
49.235.16.103 attackspambots
Jul 17 05:24:31 h2646465 sshd[6001]: Invalid user content from 49.235.16.103
Jul 17 05:24:31 h2646465 sshd[6001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.16.103
Jul 17 05:24:31 h2646465 sshd[6001]: Invalid user content from 49.235.16.103
Jul 17 05:24:33 h2646465 sshd[6001]: Failed password for invalid user content from 49.235.16.103 port 51618 ssh2
Jul 17 05:49:37 h2646465 sshd[9142]: Invalid user yo from 49.235.16.103
Jul 17 05:49:37 h2646465 sshd[9142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.16.103
Jul 17 05:49:37 h2646465 sshd[9142]: Invalid user yo from 49.235.16.103
Jul 17 05:49:39 h2646465 sshd[9142]: Failed password for invalid user yo from 49.235.16.103 port 47416 ssh2
Jul 17 05:55:24 h2646465 sshd[10258]: Invalid user dwp from 49.235.16.103
...
2020-07-17 15:28:24
1.192.171.220 attackbotsspam
Icarus honeypot on github
2020-07-17 15:31:18
1.34.232.45 attackspam
Icarus honeypot on github
2020-07-17 14:59:43

Recently Reported IPs

139.15.171.125 139.162.116.127 139.162.12.181 25.188.196.102
139.162.126.87 139.162.14.44 139.162.132.21 139.162.133.107
139.162.132.71 139.162.140.224 139.162.139.197 139.162.140.253
139.162.142.230 139.162.144.186 139.162.144.28 139.162.147.253
139.162.145.110 139.162.15.146 139.162.150.111 139.162.149.166