Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Cambridge

Region: England

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.219.109.152
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39919
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;212.219.109.152.		IN	A

;; AUTHORITY SECTION:
.			567	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020011601 1800 900 604800 86400

;; Query time: 86 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 17 04:24:45 CST 2020
;; MSG SIZE  rcvd: 119
Host info
152.109.219.212.in-addr.arpa domain name pointer no-reverse-defined.longroad.ac.uk.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
152.109.219.212.in-addr.arpa	name = no-reverse-defined.longroad.ac.uk.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.142.236.35 attack
User [anonymous] from [185.142.236.35] failed to log in via [FTP] due to authorization failure.
2019-11-06 08:55:53
172.105.5.189 attack
389/udp
[2019-11-06]1pkt
2019-11-06 13:05:44
73.118.64.17 attackspam
" "
2019-11-06 08:39:57
181.126.83.125 attackbotsspam
Nov  6 01:30:42 dedicated sshd[13476]: Invalid user hola123 from 181.126.83.125 port 43036
2019-11-06 08:46:55
51.75.24.200 attack
2019-11-06T01:03:12.445709abusebot-8.cloudsearch.cf sshd\[26669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.ip-51-75-24.eu  user=root
2019-11-06 09:05:08
188.166.77.159 attackbots
Nov  6 02:04:29 tuotantolaitos sshd[32096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.77.159
Nov  6 02:04:32 tuotantolaitos sshd[32096]: Failed password for invalid user Juhana from 188.166.77.159 port 41572 ssh2
...
2019-11-06 09:01:57
106.12.137.55 attack
Nov  5 23:52:48 TORMINT sshd\[32025\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.55  user=root
Nov  5 23:52:50 TORMINT sshd\[32025\]: Failed password for root from 106.12.137.55 port 40980 ssh2
Nov  5 23:58:01 TORMINT sshd\[32243\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.55  user=root
...
2019-11-06 13:07:43
51.83.69.78 attackspam
Nov  6 01:01:11 MainVPS sshd[1657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.69.78  user=root
Nov  6 01:01:13 MainVPS sshd[1657]: Failed password for root from 51.83.69.78 port 54730 ssh2
Nov  6 01:04:27 MainVPS sshd[1908]: Invalid user nuo from 51.83.69.78 port 35376
Nov  6 01:04:27 MainVPS sshd[1908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.69.78
Nov  6 01:04:27 MainVPS sshd[1908]: Invalid user nuo from 51.83.69.78 port 35376
Nov  6 01:04:28 MainVPS sshd[1908]: Failed password for invalid user nuo from 51.83.69.78 port 35376 ssh2
...
2019-11-06 08:43:39
107.173.145.168 attack
$f2bV_matches
2019-11-06 08:47:45
49.88.112.114 attackspambots
Nov  5 14:44:34 eddieflores sshd\[21995\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
Nov  5 14:44:36 eddieflores sshd\[21995\]: Failed password for root from 49.88.112.114 port 43418 ssh2
Nov  5 14:45:04 eddieflores sshd\[22038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
Nov  5 14:45:06 eddieflores sshd\[22038\]: Failed password for root from 49.88.112.114 port 15090 ssh2
Nov  5 14:45:37 eddieflores sshd\[22076\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
2019-11-06 08:46:22
198.245.50.81 attack
Nov  6 05:54:04 meumeu sshd[21517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.50.81 
Nov  6 05:54:06 meumeu sshd[21517]: Failed password for invalid user Bordeaux2017 from 198.245.50.81 port 57926 ssh2
Nov  6 05:58:07 meumeu sshd[21975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.50.81 
...
2019-11-06 13:05:13
128.199.162.143 attackbotsspam
Nov  6 07:05:32 sauna sshd[18706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.162.143
Nov  6 07:05:34 sauna sshd[18706]: Failed password for invalid user steamuser from 128.199.162.143 port 44948 ssh2
...
2019-11-06 13:06:37
196.11.231.220 attackspambots
Nov  6 01:30:50 ns381471 sshd[32540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.11.231.220
Nov  6 01:30:52 ns381471 sshd[32540]: Failed password for invalid user global!@#$ from 196.11.231.220 port 33931 ssh2
2019-11-06 08:36:35
222.127.97.91 attackbotsspam
Nov  5 17:35:52 srv3 sshd\[5296\]: Invalid user bandit from 222.127.97.91
Nov  5 17:35:52 srv3 sshd\[5296\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.127.97.91
Nov  5 17:35:54 srv3 sshd\[5296\]: Failed password for invalid user bandit from 222.127.97.91 port 14520 ssh2
...
2019-11-06 08:36:07
80.211.243.245 attackspambots
2019-11-05T23:18:16.114726abusebot-6.cloudsearch.cf sshd\[24079\]: Invalid user nou from 80.211.243.245 port 45374
2019-11-06 08:56:36

Recently Reported IPs

63.49.167.158 120.235.175.114 12.248.153.78 207.194.114.57
197.62.173.157 189.87.237.30 188.166.160.107 188.164.188.248
34.241.212.210 187.190.9.87 187.109.172.163 66.127.233.130
116.72.185.90 60.223.51.81 186.70.59.35 121.9.117.142
181.165.166.151 3.64.166.140 123.109.33.111 52.124.57.55