Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 215.164.242.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6711
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;215.164.242.139.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019070800 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jul 08 20:37:44 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 139.242.164.215.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 139.242.164.215.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
186.103.223.10 attack
Invalid user molowny from 186.103.223.10 port 37127
2019-12-12 14:23:43
136.232.243.70 attackbotsspam
Unauthorized connection attempt detected from IP address 136.232.243.70 to port 445
2019-12-12 14:43:32
103.221.223.126 attack
Dec 11 19:52:39 hpm sshd\[22566\]: Invalid user stidc!@\# from 103.221.223.126
Dec 11 19:52:39 hpm sshd\[22566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.221.223.126
Dec 11 19:52:41 hpm sshd\[22566\]: Failed password for invalid user stidc!@\# from 103.221.223.126 port 41440 ssh2
Dec 11 19:59:16 hpm sshd\[23226\]: Invalid user heyerdalsimonsen from 103.221.223.126
Dec 11 19:59:16 hpm sshd\[23226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.221.223.126
2019-12-12 14:05:56
144.217.214.100 attack
Dec 12 06:44:02 jane sshd[1919]: Failed password for root from 144.217.214.100 port 54276 ssh2
...
2019-12-12 14:11:49
223.204.247.60 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 12-12-2019 04:55:10.
2019-12-12 14:03:36
158.69.197.113 attack
Invalid user amit from 158.69.197.113 port 60488
2019-12-12 14:01:11
165.227.46.221 attack
$f2bV_matches
2019-12-12 14:41:34
117.55.247.38 attackspam
1576126505 - 12/12/2019 05:55:05 Host: 117.55.247.38/117.55.247.38 Port: 445 TCP Blocked
2019-12-12 14:10:03
191.189.30.241 attack
$f2bV_matches
2019-12-12 14:13:29
121.22.99.235 attackspam
Dec 11 20:25:27 auw2 sshd\[30536\]: Invalid user dovecot from 121.22.99.235
Dec 11 20:25:27 auw2 sshd\[30536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.22.99.235
Dec 11 20:25:30 auw2 sshd\[30536\]: Failed password for invalid user dovecot from 121.22.99.235 port 8277 ssh2
Dec 11 20:30:20 auw2 sshd\[30987\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.22.99.235  user=root
Dec 11 20:30:23 auw2 sshd\[30987\]: Failed password for root from 121.22.99.235 port 60159 ssh2
2019-12-12 14:44:40
149.129.242.80 attackspam
Triggered by Fail2Ban at Ares web server
2019-12-12 14:42:28
37.49.231.118 attackspam
*Port Scan* detected from 37.49.231.118 (NL/Netherlands/-). 4 hits in the last 155 seconds
2019-12-12 14:10:30
106.51.3.214 attackspambots
Dec 12 07:33:52 ns382633 sshd\[28571\]: Invalid user lukers from 106.51.3.214 port 53657
Dec 12 07:33:52 ns382633 sshd\[28571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.3.214
Dec 12 07:33:54 ns382633 sshd\[28571\]: Failed password for invalid user lukers from 106.51.3.214 port 53657 ssh2
Dec 12 07:42:15 ns382633 sshd\[30218\]: Invalid user lv from 106.51.3.214 port 36481
Dec 12 07:42:15 ns382633 sshd\[30218\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.3.214
2019-12-12 14:46:48
185.176.27.118 attackspambots
ET DROP Dshield Block Listed Source group 1 - port: 1995 proto: TCP cat: Misc Attack
2019-12-12 14:16:07
201.48.206.146 attackbots
Dec 12 06:28:03 [host] sshd[896]: Invalid user samba from 201.48.206.146
Dec 12 06:28:03 [host] sshd[896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.206.146
Dec 12 06:28:05 [host] sshd[896]: Failed password for invalid user samba from 201.48.206.146 port 45303 ssh2
2019-12-12 13:57:23

Recently Reported IPs

146.141.194.227 40.85.32.240 13.160.108.94 79.65.82.40
160.3.207.36 185.108.215.213 196.193.136.224 96.83.234.5
116.27.244.255 115.226.245.48 115.226.225.66 49.149.60.37
115.226.225.41 79.164.82.95 152.32.72.247 122.3.105.125
115.220.35.45 181.14.177.44 209.124.197.27 115.220.32.231