Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.215.107.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8756
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;212.215.107.149.		IN	A

;; AUTHORITY SECTION:
.			195	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020062400 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 24 21:02:08 CST 2020
;; MSG SIZE  rcvd: 119
Host info
Host 149.107.215.212.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.107.215.212.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
62.76.229.231 attackspam
0,34-05/29 [bc05/m17] PostRequest-Spammer scoring: lisboa
2020-10-01 06:29:42
45.64.128.160 attackbots
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-10-01 06:56:42
190.73.45.75 attackspambots
Brute-force attempt banned
2020-10-01 06:33:05
193.27.228.157 attackspambots
 TCP (SYN) 193.27.228.157:55227 -> port 12048, len 44
2020-10-01 06:36:39
112.248.124.164 attackbots
Hit honeypot r.
2020-10-01 06:33:44
159.65.157.221 attackspambots
159.65.157.221 - - [30/Sep/2020:06:18:43 -0600] "GET /wp-login.php HTTP/1.1" 301 470 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-01 06:30:50
195.246.57.116 attackbotsspam
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 60
2020-10-01 06:59:36
141.98.81.154 attackspam
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-30T22:01:30Z
2020-10-01 06:38:45
51.79.173.79 attackspambots
SSH Invalid Login
2020-10-01 06:35:24
167.248.133.29 attackspam
 TCP (SYN) 167.248.133.29:64517 -> port 2222, len 44
2020-10-01 06:37:52
114.113.81.130 attack
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-01 06:39:34
5.188.156.92 attackspambots
firewall-block, port(s): 33389/tcp
2020-10-01 06:58:28
193.27.228.172 attack
Port-scan: detected 211 distinct ports within a 24-hour window.
2020-10-01 07:02:00
89.248.172.140 attack
scans 10 times in preceeding hours on the ports (in chronological order) 2728 4590 4446 3410 20222 1983 5656 6300 2728 3031 resulting in total of 70 scans from 89.248.160.0-89.248.174.255 block.
2020-10-01 06:47:26
51.195.63.170 attack
51.195.63.170 was recorded 13 times by 4 hosts attempting to connect to the following ports: 5060. Incident counter (4h, 24h, all-time): 13, 79, 338
2020-10-01 06:28:11

Recently Reported IPs

14.231.91.95 192.241.211.14 52.163.48.172 109.117.239.76
69.195.124.68 23.99.196.47 5.252.224.135 117.99.160.185
140.114.91.212 51.89.72.184 200.84.209.173 150.95.116.177
177.220.176.204 60.167.176.247 107.222.114.58 139.59.15.47
192.35.168.197 190.204.178.85 216.58.212.3 45.234.32.223