Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Cologne

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: Telekom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.8.139.155
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42896
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.8.139.155.			IN	A

;; AUTHORITY SECTION:
.			330	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021122501 1800 900 604800 86400

;; Query time: 89 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 26 03:54:54 CST 2021
;; MSG SIZE  rcvd: 106
Host info
155.139.8.212.in-addr.arpa domain name pointer xdsl-212-8-139-155.nc.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
155.139.8.212.in-addr.arpa	name = xdsl-212-8-139-155.nc.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
203.204.188.11 attack
2020-09-18T11:24:32.507607abusebot-8.cloudsearch.cf sshd[19830]: Invalid user nx from 203.204.188.11 port 33170
2020-09-18T11:24:32.514805abusebot-8.cloudsearch.cf sshd[19830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=host-203-204-188-11.static.kbtelecom.net
2020-09-18T11:24:32.507607abusebot-8.cloudsearch.cf sshd[19830]: Invalid user nx from 203.204.188.11 port 33170
2020-09-18T11:24:34.799062abusebot-8.cloudsearch.cf sshd[19830]: Failed password for invalid user nx from 203.204.188.11 port 33170 ssh2
2020-09-18T11:30:42.344936abusebot-8.cloudsearch.cf sshd[19848]: Invalid user server from 203.204.188.11 port 53216
2020-09-18T11:30:42.352364abusebot-8.cloudsearch.cf sshd[19848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=host-203-204-188-11.static.kbtelecom.net
2020-09-18T11:30:42.344936abusebot-8.cloudsearch.cf sshd[19848]: Invalid user server from 203.204.188.11 port 53216
2020-09-18T11:30:43
...
2020-09-19 00:39:28
87.107.138.186 attackbots
Automatic report - Port Scan Attack
2020-09-19 00:49:58
104.248.149.130 attack
$f2bV_matches
2020-09-19 01:01:39
61.177.172.128 attackspam
Sep 18 18:37:25 santamaria sshd\[17282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.128  user=root
Sep 18 18:37:28 santamaria sshd\[17282\]: Failed password for root from 61.177.172.128 port 62532 ssh2
Sep 18 18:37:49 santamaria sshd\[17284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.128  user=root
...
2020-09-19 00:40:54
92.222.216.222 attack
2020-09-18T08:25:37+0000 Failed SSH Authentication/Brute Force Attack. (Server 6)
2020-09-19 00:49:15
156.54.164.97 attack
Fail2Ban Ban Triggered (2)
2020-09-19 01:00:29
196.158.201.42 attack
Port probing on unauthorized port 445
2020-09-19 00:52:27
51.15.204.27 attack
Sep 18 13:19:28 firewall sshd[30234]: Failed password for invalid user kong from 51.15.204.27 port 45500 ssh2
Sep 18 13:23:12 firewall sshd[30318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.204.27  user=root
Sep 18 13:23:14 firewall sshd[30318]: Failed password for root from 51.15.204.27 port 54734 ssh2
...
2020-09-19 00:56:23
185.191.171.12 attack
WEB_SERVER 403 Forbidden
2020-09-19 00:42:44
112.85.42.74 attackbots
Sep 18 09:53:36 dignus sshd[8541]: Failed password for root from 112.85.42.74 port 19891 ssh2
Sep 18 09:53:38 dignus sshd[8541]: Failed password for root from 112.85.42.74 port 19891 ssh2
Sep 18 09:54:16 dignus sshd[8615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.74  user=root
Sep 18 09:54:17 dignus sshd[8615]: Failed password for root from 112.85.42.74 port 62879 ssh2
Sep 18 09:54:20 dignus sshd[8615]: Failed password for root from 112.85.42.74 port 62879 ssh2
...
2020-09-19 01:09:18
103.23.100.87 attackspam
Sep 18 18:36:41 santamaria sshd\[17280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.23.100.87  user=root
Sep 18 18:36:43 santamaria sshd\[17280\]: Failed password for root from 103.23.100.87 port 52670 ssh2
Sep 18 18:41:17 santamaria sshd\[17354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.23.100.87  user=root
...
2020-09-19 00:51:28
185.51.201.115 attackspambots
[ssh] SSH attack
2020-09-19 00:32:33
142.4.211.222 attackspambots
142.4.211.222 - - [18/Sep/2020:12:03:38 +0200] "GET /wp-login.php HTTP/1.1" 200 2566 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.4.211.222 - - [18/Sep/2020:12:03:39 +0200] "POST /wp-login.php HTTP/1.1" 200 2698 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.4.211.222 - - [18/Sep/2020:12:03:39 +0200] "GET /wp-login.php HTTP/1.1" 200 2566 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.4.211.222 - - [18/Sep/2020:12:03:39 +0200] "POST /wp-login.php HTTP/1.1" 200 2672 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.4.211.222 - - [18/Sep/2020:12:03:40 +0200] "GET /wp-login.php HTTP/1.1" 200 2566 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.4.211.222 - - [18/Sep/2020:12:03:40 +0200] "POST /wp-login.php HTTP/1.1" 200 2673 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Fir
...
2020-09-19 01:06:25
60.243.168.128 attack
DATE:2020-09-17 18:56:42, IP:60.243.168.128, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-09-19 00:39:10
103.254.73.98 attack
$f2bV_matches
2020-09-19 00:58:24

Recently Reported IPs

209.93.250.234 123.251.12.98 243.7.206.222 60.239.177.196
132.18.250.205 192.189.194.171 11.139.66.187 61.52.229.80
102.72.40.82 226.169.29.33 36.190.230.27 61.206.140.195
117.198.241.199 21.21.49.109 112.181.228.63 32.83.38.247
105.172.230.65 103.6.94.5 43.127.143.235 19.0.7.182