Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.215.109.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9802
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;196.215.109.168.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031500 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 15 15:30:37 CST 2025
;; MSG SIZE  rcvd: 108
Host info
168.109.215.196.in-addr.arpa domain name pointer 196-215-109-168.dynamic.isadsl.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
168.109.215.196.in-addr.arpa	name = 196-215-109-168.dynamic.isadsl.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
126.74.184.85 attack
Jul  2 05:50:33 web1 sshd\[12843\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=126.74.184.85  user=root
Jul  2 05:50:35 web1 sshd\[12843\]: Failed password for root from 126.74.184.85 port 60672 ssh2
Jul  2 05:50:41 web1 sshd\[12843\]: Failed password for root from 126.74.184.85 port 60672 ssh2
Jul  2 05:50:43 web1 sshd\[12843\]: Failed password for root from 126.74.184.85 port 60672 ssh2
Jul  2 05:50:45 web1 sshd\[12843\]: Failed password for root from 126.74.184.85 port 60672 ssh2
2019-07-02 15:35:44
151.42.136.192 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-02 00:05:19,876 INFO [shellcode_manager] (151.42.136.192) no match, writing hexdump (b3b6ed8149d54c8b9dc0930baf15f747 :2222431) - MS17010 (EternalBlue)
2019-07-02 15:52:57
45.32.213.73 attackspam
Jul  2 05:43:48 localhost sshd\[13930\]: Invalid user 123456 from 45.32.213.73 port 38645
Jul  2 05:43:48 localhost sshd\[13930\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.32.213.73
...
2019-07-02 15:29:02
217.66.234.80 attack
9527/tcp 81/tcp
[2019-05-06/07-02]2pkt
2019-07-02 15:54:35
42.123.90.110 attackspam
445/tcp 445/tcp 445/tcp...
[2019-05-06/07-02]7pkt,1pt.(tcp)
2019-07-02 15:45:27
167.114.0.23 attackspambots
2019-07-02T09:15:49.913852cavecanem sshd[11853]: Invalid user hadoop from 167.114.0.23 port 50276
2019-07-02T09:15:49.916364cavecanem sshd[11853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.0.23
2019-07-02T09:15:49.913852cavecanem sshd[11853]: Invalid user hadoop from 167.114.0.23 port 50276
2019-07-02T09:15:51.981898cavecanem sshd[11853]: Failed password for invalid user hadoop from 167.114.0.23 port 50276 ssh2
2019-07-02T09:18:09.295667cavecanem sshd[12450]: Invalid user raspbian from 167.114.0.23 port 47538
2019-07-02T09:18:09.298164cavecanem sshd[12450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.0.23
2019-07-02T09:18:09.295667cavecanem sshd[12450]: Invalid user raspbian from 167.114.0.23 port 47538
2019-07-02T09:18:11.915760cavecanem sshd[12450]: Failed password for invalid user raspbian from 167.114.0.23 port 47538 ssh2
2019-07-02T09:20:19.936725cavecanem sshd[13050]: Invalid
...
2019-07-02 15:25:54
78.111.97.4 attack
445/tcp 445/tcp 445/tcp...
[2019-06-14/07-02]7pkt,1pt.(tcp)
2019-07-02 15:20:30
118.25.103.11 attack
Apr 19 10:02:51 motanud sshd\[19973\]: Invalid user london from 118.25.103.11 port 53320
Apr 19 10:02:51 motanud sshd\[19973\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.103.11
Apr 19 10:02:53 motanud sshd\[19973\]: Failed password for invalid user london from 118.25.103.11 port 53320 ssh2
2019-07-02 15:18:23
118.24.89.243 attackbotsspam
Jul  2 08:17:16 MK-Soft-Root2 sshd\[6880\]: Invalid user pf from 118.24.89.243 port 57862
Jul  2 08:17:16 MK-Soft-Root2 sshd\[6880\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.89.243
Jul  2 08:17:18 MK-Soft-Root2 sshd\[6880\]: Failed password for invalid user pf from 118.24.89.243 port 57862 ssh2
...
2019-07-02 15:31:37
34.219.212.205 attack
TCP port 8080 (HTTP) attempt blocked by firewall. [2019-07-02 05:50:30]
2019-07-02 15:11:32
160.20.15.41 attackbotsspam
445/tcp 445/tcp 445/tcp...
[2019-05-06/07-02]7pkt,1pt.(tcp)
2019-07-02 15:39:57
81.252.153.139 attackspambots
445/tcp 445/tcp
[2019-06-28/07-02]2pkt
2019-07-02 15:28:30
206.189.145.152 attackspambots
DATE:2019-07-02 09:04:37, IP:206.189.145.152, PORT:ssh brute force auth on SSH service (patata)
2019-07-02 15:05:45
193.56.29.115 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-02 02:28:33,911 INFO [amun_request_handler] PortScan Detected on Port: 445 (193.56.29.115)
2019-07-02 15:29:50
177.155.214.249 attackbotsspam
445/tcp 445/tcp 445/tcp...
[2019-06-10/07-02]9pkt,1pt.(tcp)
2019-07-02 15:12:36

Recently Reported IPs

217.107.12.14 28.150.44.66 149.54.172.57 31.38.114.253
72.102.93.201 14.224.214.31 25.42.210.249 200.41.18.121
72.184.12.212 142.204.201.187 200.51.173.217 92.65.122.56
27.157.49.157 200.20.170.25 86.121.224.61 103.170.28.207
45.138.4.223 107.172.59.30 246.100.189.101 216.85.56.227