Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Los Angeles

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       216.234.140.0 - 216.234.143.255
CIDR:           216.234.140.0/22
NetName:        DMITI-IPV4-D
NetHandle:      NET-216-234-140-0-1
Parent:         NET216 (NET-216-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   DMIT Cloud Services (DMITI)
RegDate:        2023-09-29
Updated:        2023-09-29
Ref:            https://rdap.arin.net/registry/ip/216.234.140.0


OrgName:        DMIT Cloud Services
OrgId:          DMITI
Address:        418 Broadway Ste N
City:           Albany
StateProv:      NY
PostalCode:     12207
Country:        US
RegDate:        2018-01-08
Updated:        2026-01-27
Ref:            https://rdap.arin.net/registry/entity/DMITI


OrgTechHandle: NOC32817-ARIN
OrgTechName:   Network Operations Center
OrgTechPhone:  +1-518-992-0595 
OrgTechEmail:  noc@dmit.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NOC32817-ARIN

OrgNOCHandle: NOC32817-ARIN
OrgNOCName:   Network Operations Center
OrgNOCPhone:  +1-518-992-0595 
OrgNOCEmail:  noc@dmit.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/NOC32817-ARIN

OrgAbuseHandle: ABUSE7106-ARIN
OrgAbuseName:   Abuse Department
OrgAbusePhone:  +1-518-992-0595 
OrgAbuseEmail:  abuse@dmit.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE7106-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.234.140.59
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51571
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;216.234.140.59.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026020504 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 06 07:45:22 CST 2026
;; MSG SIZE  rcvd: 107
Host info
b'59.140.234.216.in-addr.arpa domain name pointer host-by.dmit.com.
'
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
59.140.234.216.in-addr.arpa	name = Host-By.DMIT.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
213.82.114.206 attack
Sep 23 17:15:55 markkoudstaal sshd[14194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.82.114.206
Sep 23 17:15:57 markkoudstaal sshd[14194]: Failed password for invalid user vz from 213.82.114.206 port 46006 ssh2
Sep 23 17:20:32 markkoudstaal sshd[14600]: Failed password for root from 213.82.114.206 port 59460 ssh2
2019-09-23 23:35:02
222.186.173.154 attackspam
19/9/23@11:24:41: FAIL: Alarm-SSH address from=222.186.173.154
...
2019-09-23 23:31:00
76.72.8.136 attackspam
Sep 23 17:25:41 eventyay sshd[23346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.72.8.136
Sep 23 17:25:43 eventyay sshd[23346]: Failed password for invalid user appldev from 76.72.8.136 port 43006 ssh2
Sep 23 17:30:04 eventyay sshd[23447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.72.8.136
...
2019-09-23 23:42:32
85.12.245.153 attackspambots
To many SASL auth failed
2019-09-23 23:46:08
163.172.38.122 attackbots
ssh failed login
2019-09-23 23:56:38
37.59.17.24 attackbotsspam
$f2bV_matches_ltvn
2019-09-23 23:28:38
174.76.104.67 attackbots
Wordpress brute-force
2019-09-23 23:25:02
220.76.107.50 attack
Sep 23 15:21:39 hcbbdb sshd\[12999\]: Invalid user ni from 220.76.107.50
Sep 23 15:21:39 hcbbdb sshd\[12999\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.76.107.50
Sep 23 15:21:41 hcbbdb sshd\[12999\]: Failed password for invalid user ni from 220.76.107.50 port 53514 ssh2
Sep 23 15:26:07 hcbbdb sshd\[13518\]: Invalid user eustaces from 220.76.107.50
Sep 23 15:26:07 hcbbdb sshd\[13518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.76.107.50
2019-09-23 23:29:53
106.52.18.180 attackspambots
Sep 23 17:36:33 vps691689 sshd[11714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.18.180
Sep 23 17:36:35 vps691689 sshd[11714]: Failed password for invalid user ned from 106.52.18.180 port 53690 ssh2
...
2019-09-24 00:16:59
106.13.9.75 attackspambots
Sep 23 17:48:36 MK-Soft-VM4 sshd[25953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.9.75 
Sep 23 17:48:38 MK-Soft-VM4 sshd[25953]: Failed password for invalid user glassfish from 106.13.9.75 port 34420 ssh2
...
2019-09-23 23:52:49
114.38.16.201 attackspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/114.38.16.201/ 
 TW - 1H : (2829)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 114.38.16.201 
 
 CIDR : 114.38.0.0/16 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 WYKRYTE ATAKI Z ASN3462 :  
  1H - 284 
  3H - 1109 
  6H - 2239 
 12H - 2731 
 24H - 2740 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-09-23 23:42:02
115.87.98.99 attackbotsspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/115.87.98.99/ 
 TH - 1H : (126)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TH 
 NAME ASN : ASN17552 
 
 IP : 115.87.98.99 
 
 CIDR : 115.87.96.0/19 
 
 PREFIX COUNT : 345 
 
 UNIQUE IP COUNT : 1515264 
 
 
 WYKRYTE ATAKI Z ASN17552 :  
  1H - 1 
  3H - 9 
  6H - 20 
 12H - 22 
 24H - 27 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-09-23 23:36:11
123.207.40.70 attackspam
$f2bV_matches
2019-09-23 23:28:11
138.68.155.9 attackbotsspam
Sep 23 12:02:24 ny01 sshd[8461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.155.9
Sep 23 12:02:26 ny01 sshd[8461]: Failed password for invalid user lmadmin from 138.68.155.9 port 58715 ssh2
Sep 23 12:06:35 ny01 sshd[9207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.155.9
2019-09-24 00:17:50
218.92.0.204 attack
2019-09-23T15:17:21.463483abusebot-8.cloudsearch.cf sshd\[15515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.204  user=root
2019-09-23 23:25:53

Recently Reported IPs

111.208.78.229 110.18.12.103 101.28.195.235 54.144.193.250
61.224.89.26 117.44.229.17 171.35.100.71 40.70.26.226
14.212.55.66 34.22.151.18 104.152.52.220 110.249.201.12
10.1.224.3 41.38.56.232 162.216.150.199 216.58.217.120
173.225.242.244 183.165.66.231 138.197.162.136 34.60.107.64