Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.215.216.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10669
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.215.216.196.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021101 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 04:10:46 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 196.216.215.142.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 196.216.215.142.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
181.223.213.28 attack
Invalid user postgres from 181.223.213.28 port 56956
2019-06-24 13:37:00
92.119.160.80 attackbots
Jun 24 01:15:53 xtremcommunity sshd\[11597\]: Invalid user admin from 92.119.160.80 port 48393
Jun 24 01:15:53 xtremcommunity sshd\[11597\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.119.160.80
Jun 24 01:15:55 xtremcommunity sshd\[11597\]: Failed password for invalid user admin from 92.119.160.80 port 48393 ssh2
Jun 24 01:15:56 xtremcommunity sshd\[11599\]: Invalid user admin from 92.119.160.80 port 49773
Jun 24 01:15:57 xtremcommunity sshd\[11599\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.119.160.80
...
2019-06-24 13:47:26
119.201.109.155 attack
Jun 24 07:56:13 srv206 sshd[17162]: Invalid user stagiaire from 119.201.109.155
Jun 24 07:56:13 srv206 sshd[17162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.201.109.155
Jun 24 07:56:13 srv206 sshd[17162]: Invalid user stagiaire from 119.201.109.155
Jun 24 07:56:15 srv206 sshd[17162]: Failed password for invalid user stagiaire from 119.201.109.155 port 55014 ssh2
...
2019-06-24 14:11:58
178.62.117.82 attackspambots
Invalid user varza from 178.62.117.82 port 48256
2019-06-24 13:38:21
193.188.22.12 attack
2019-06-24T05:52:04.418036abusebot-5.cloudsearch.cf sshd\[10151\]: Invalid user ubnt from 193.188.22.12 port 45688
2019-06-24 14:00:43
149.56.15.98 attackspam
Invalid user dao from 149.56.15.98 port 46219
2019-06-24 14:08:33
123.20.37.219 attack
Invalid user admin from 123.20.37.219 port 54880
2019-06-24 13:42:12
138.68.226.175 attackspam
Invalid user ntpupdate from 138.68.226.175 port 35666
2019-06-24 14:10:30
69.17.158.101 attackspambots
Invalid user web from 69.17.158.101 port 57102
2019-06-24 13:51:46
178.128.55.52 attackspambots
Invalid user chui from 178.128.55.52 port 59463
2019-06-24 13:37:54
198.211.107.151 attackbotsspam
Invalid user wordpress from 198.211.107.151 port 33783
2019-06-24 13:59:23
121.190.197.205 attack
Invalid user hugo from 121.190.197.205 port 50842
2019-06-24 14:11:41
106.13.51.110 attackspam
Invalid user stream from 106.13.51.110 port 50464
2019-06-24 13:44:37
106.12.216.63 attackbotsspam
Invalid user admin from 106.12.216.63 port 49698
2019-06-24 13:22:37
73.22.244.37 attackbotsspam
Invalid user osbash from 73.22.244.37 port 59794
2019-06-24 13:25:38

Recently Reported IPs

222.82.22.183 113.86.6.16 9.35.93.32 223.222.246.248
96.231.226.2 156.100.190.92 220.100.91.51 219.45.8.190
55.91.9.183 232.60.211.142 62.21.188.237 42.247.217.82
189.50.37.144 52.109.59.68 108.146.215.195 140.240.13.203
44.252.14.52 24.148.3.116 62.231.27.162 52.142.65.198