Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Slovakia

Internet Service Provider: unknown

Hostname: unknown

Organization: Zdruzenie pouzivatelov Slovenskej akademickej datovej siete

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.213.115.10
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50364
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;147.213.115.10.			IN	A

;; AUTHORITY SECTION:
.			3260	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060901 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jun 10 03:30:37 CST 2019
;; MSG SIZE  rcvd: 118

Host info
Host 10.115.213.147.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 10.115.213.147.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
49.235.16.103 attackspam
$f2bV_matches
2020-02-26 22:33:23
209.97.160.105 attackbotsspam
Feb 26 15:17:22 ns381471 sshd[30710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.160.105
Feb 26 15:17:24 ns381471 sshd[30710]: Failed password for invalid user jigang from 209.97.160.105 port 44386 ssh2
2020-02-26 22:27:30
103.98.30.72 attackbots
Attempt to hack Wordpress Login, XMLRPC or other login
2020-02-26 22:30:32
51.255.150.119 attack
Feb 26 14:37:57 v22018076622670303 sshd\[8560\]: Invalid user oracle from 51.255.150.119 port 36168
Feb 26 14:37:57 v22018076622670303 sshd\[8560\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.150.119
Feb 26 14:37:58 v22018076622670303 sshd\[8560\]: Failed password for invalid user oracle from 51.255.150.119 port 36168 ssh2
...
2020-02-26 22:32:27
213.32.120.155 attack
$f2bV_matches
2020-02-26 22:49:16
213.190.31.77 attack
$f2bV_matches
2020-02-26 23:00:30
71.165.90.119 attack
Feb 26 19:09:27 gw1 sshd[25463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.165.90.119
Feb 26 19:09:28 gw1 sshd[25463]: Failed password for invalid user ackerjapan from 71.165.90.119 port 33766 ssh2
...
2020-02-26 22:56:45
213.59.157.168 attackbots
$f2bV_matches
2020-02-26 22:40:41
34.73.212.241 attackspambots
SIP/5060 Probe, BF, Hack -
2020-02-26 22:48:19
213.32.88.138 attackbotsspam
$f2bV_matches
2020-02-26 22:44:17
130.83.73.87 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-02-26 22:29:21
213.96.140.56 attackspam
$f2bV_matches
2020-02-26 22:28:16
213.60.165.77 attackspam
$f2bV_matches
2020-02-26 22:38:40
213.32.71.196 attackbotsspam
$f2bV_matches
2020-02-26 22:45:12
198.245.50.81 attack
Feb 26 14:23:12 localhost sshd\[6214\]: Invalid user vmail from 198.245.50.81 port 34262
Feb 26 14:23:12 localhost sshd\[6214\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.50.81
Feb 26 14:23:14 localhost sshd\[6214\]: Failed password for invalid user vmail from 198.245.50.81 port 34262 ssh2
Feb 26 14:32:27 localhost sshd\[6447\]: Invalid user carlos from 198.245.50.81 port 50484
Feb 26 14:32:27 localhost sshd\[6447\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.50.81
...
2020-02-26 22:42:56

Recently Reported IPs

24.135.239.252 108.18.120.34 156.91.200.189 51.211.171.227
63.239.220.79 4.222.161.60 201.97.57.122 223.26.31.114
150.255.116.245 98.177.162.185 112.138.47.13 63.69.252.78
190.254.242.181 216.26.234.89 194.44.216.42 192.82.6.242
90.6.200.145 40.92.254.21 221.188.86.98 1.109.189.53