Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Finland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.215.39.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17243
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.215.39.199.			IN	A

;; AUTHORITY SECTION:
.			376	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010801 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 09 11:25:45 CST 2022
;; MSG SIZE  rcvd: 107
Host info
199.39.215.164.in-addr.arpa is an alias for 199.192-255.39.215.164.in-addr.arpa.
199.192-255.39.215.164.in-addr.arpa domain name pointer loadbalancer1.shellit.fi.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
199.39.215.164.in-addr.arpa	canonical name = 199.192-255.39.215.164.in-addr.arpa.
199.192-255.39.215.164.in-addr.arpa	name = loadbalancer1.shellit.fi.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
78.128.113.42 attack
Port scan on 5 port(s): 3128 3178 33069 33289 40004
2020-05-28 23:10:17
80.211.59.57 attackspam
2020-05-28T14:48:50.991553server.espacesoutien.com sshd[30575]: Invalid user admin from 80.211.59.57 port 33180
2020-05-28T14:48:51.003054server.espacesoutien.com sshd[30575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.59.57
2020-05-28T14:48:50.991553server.espacesoutien.com sshd[30575]: Invalid user admin from 80.211.59.57 port 33180
2020-05-28T14:48:52.777348server.espacesoutien.com sshd[30575]: Failed password for invalid user admin from 80.211.59.57 port 33180 ssh2
...
2020-05-28 22:58:01
185.10.68.149 attack
 TCP (SYN) 185.10.68.149:41986 -> port 80, len 40
2020-05-28 22:59:02
49.232.152.36 attackspambots
Failed password for root from 49.232.152.36 port 58868 ssh2
Invalid user rdboden from 49.232.152.36 port 48700
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.152.36
Invalid user rdboden from 49.232.152.36 port 48700
Failed password for invalid user rdboden from 49.232.152.36 port 48700 ssh2
2020-05-28 22:37:06
37.190.61.6 attackbots
Unauthorized connection attempt from IP address 37.190.61.6 on Port 445(SMB)
2020-05-28 23:02:27
212.129.16.53 attackspambots
May 28 15:34:02  sshd\[4605\]: User root from 212.129.16.53 not allowed because not listed in AllowUsersMay 28 15:34:04  sshd\[4605\]: Failed password for invalid user root from 212.129.16.53 port 46780 ssh2
...
2020-05-28 22:47:27
167.99.131.243 attackbots
May 28 14:33:32 ns381471 sshd[14216]: Failed password for root from 167.99.131.243 port 53116 ssh2
2020-05-28 22:47:47
106.13.70.63 attack
2020-05-28T18:58:07.352007billing sshd[30283]: Failed password for operator from 106.13.70.63 port 33604 ssh2
2020-05-28T19:01:37.984458billing sshd[5964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.70.63  user=root
2020-05-28T19:01:39.734723billing sshd[5964]: Failed password for root from 106.13.70.63 port 51052 ssh2
...
2020-05-28 22:51:45
122.160.114.174 attackbotsspam
Unauthorized connection attempt from IP address 122.160.114.174 on Port 445(SMB)
2020-05-28 22:42:15
14.40.103.3 attack
May 28 14:01:37 fhem-rasp sshd[9099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.40.103.3  user=root
May 28 14:01:39 fhem-rasp sshd[9099]: Failed password for root from 14.40.103.3 port 39769 ssh2
...
2020-05-28 22:52:45
200.116.47.247 attackbots
Too many connections or unauthorized access detected from Arctic banned ip
2020-05-28 22:39:51
111.229.211.78 attackbots
May 28 14:01:26  sshd\[32244\]: User root from 111.229.211.78 not allowed because not listed in AllowUsersMay 28 14:01:27  sshd\[32244\]: Failed password for invalid user root from 111.229.211.78 port 57490 ssh2
...
2020-05-28 23:10:00
220.238.65.42 attack
" "
2020-05-28 22:40:55
183.83.91.22 attackbotsspam
Unauthorized connection attempt from IP address 183.83.91.22 on Port 445(SMB)
2020-05-28 23:06:24
182.141.184.154 attack
May 28 13:53:48 server sshd[16161]: Failed password for root from 182.141.184.154 port 51060 ssh2
May 28 13:57:43 server sshd[16482]: Failed password for root from 182.141.184.154 port 47962 ssh2
May 28 14:01:38 server sshd[17583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.141.184.154
...
2020-05-28 22:53:17

Recently Reported IPs

82.10.221.30 213.187.30.130 232.27.45.206 140.87.88.13
82.17.67.116 195.23.124.129 44.196.65.19 190.19.116.13
47.20.163.34 2.183.126.167 139.36.180.241 10.183.220.187
214.62.1.169 42.21.201.236 95.110.130.69 10.197.208.31
202.183.204.172 69.171.209.167 121.169.28.240 10.173.63.80