Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Columbus

Region: Ohio

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.138.122.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5349
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;107.138.122.164.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091601 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Sep 17 02:20:02 CST 2019
;; MSG SIZE  rcvd: 119
Host info
164.122.138.107.in-addr.arpa domain name pointer 107-138-122-164.lightspeed.clmboh.sbcglobal.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
164.122.138.107.in-addr.arpa	name = 107-138-122-164.lightspeed.clmboh.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
60.30.92.74 attackbotsspam
Automatic report - Banned IP Access
2019-08-02 03:58:36
183.57.248.43 attack
Aug  1 15:18:25 mail kernel: \[1926745.710296\] \[UFW BLOCK\] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=183.57.248.43 DST=91.205.173.180 LEN=44 TOS=0x00 PREC=0x00 TTL=51 ID=52537 PROTO=TCP SPT=34834 DPT=23 WINDOW=29938 RES=0x00 SYN URGP=0 
Aug  1 15:18:29 mail kernel: \[1926749.392178\] \[UFW BLOCK\] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=183.57.248.43 DST=91.205.173.180 LEN=44 TOS=0x00 PREC=0x00 TTL=51 ID=52537 PROTO=TCP SPT=34834 DPT=23 WINDOW=29938 RES=0x00 SYN URGP=0 
Aug  1 15:19:24 mail kernel: \[1926805.011691\] \[UFW BLOCK\] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=183.57.248.43 DST=91.205.173.180 LEN=44 TOS=0x00 PREC=0x00 TTL=51 ID=52537 PROTO=TCP SPT=34834 DPT=23 WINDOW=29938 RES=0x00 SYN URGP=0
2019-08-02 03:38:36
103.87.27.38 attackbotsspam
Unauthorised access (Aug  1) SRC=103.87.27.38 LEN=40 TOS=0x10 TTL=54 ID=34551 TCP DPT=8080 WINDOW=49933 SYN 
Unauthorised access (Aug  1) SRC=103.87.27.38 LEN=40 TOS=0x10 TTL=54 ID=65205 TCP DPT=8080 WINDOW=49933 SYN 
Unauthorised access (Jul 30) SRC=103.87.27.38 LEN=40 TOS=0x10 TTL=54 ID=48544 TCP DPT=23 WINDOW=5882 SYN
2019-08-02 03:21:44
185.246.128.26 attackbotsspam
Aug  1 19:44:04 rpi sshd[24158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.246.128.26 
Aug  1 19:44:06 rpi sshd[24158]: Failed password for invalid user 0 from 185.246.128.26 port 37494 ssh2
2019-08-02 03:53:31
89.45.17.11 attack
Aug  1 15:19:17 ns41 sshd[2543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.45.17.11
2019-08-02 03:42:55
216.155.93.77 attack
Automated report - ssh fail2ban:
Aug 1 21:15:33 authentication failure 
Aug 1 21:15:35 wrong password, user=consultant, port=36922, ssh2
Aug 1 21:47:33 authentication failure
2019-08-02 03:48:12
106.51.143.129 attackspam
Aug  1 21:22:46 meumeu sshd[25148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.143.129 
Aug  1 21:22:48 meumeu sshd[25148]: Failed password for invalid user rocky from 106.51.143.129 port 44856 ssh2
Aug  1 21:27:46 meumeu sshd[25664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.143.129 
...
2019-08-02 03:46:16
190.5.111.115 attackbots
SMB Server BruteForce Attack
2019-08-02 03:31:35
222.186.30.235 attackspam
Jul 30 16:38:26 netserv300 sshd[24277]: Connection from 222.186.30.235 port 20427 on 178.63.236.16 port 22
Jul 30 16:38:26 netserv300 sshd[24278]: Connection from 222.186.30.235 port 20088 on 178.63.236.19 port 22
Jul 30 16:38:26 netserv300 sshd[24281]: Connection from 222.186.30.235 port 57851 on 178.63.236.17 port 22
Jul 30 16:39:50 netserv300 sshd[24301]: Connection from 222.186.30.235 port 45185 on 178.63.236.16 port 22
Jul 30 16:39:50 netserv300 sshd[24303]: Connection from 222.186.30.235 port 44852 on 178.63.236.19 port 22
Jul 30 16:39:50 netserv300 sshd[24305]: Connection from 222.186.30.235 port 27961 on 178.63.236.17 port 22
Jul 30 16:40:14 netserv300 sshd[24325]: Connection from 222.186.30.235 port 60411 on 178.63.236.18 port 22
Jul 30 17:04:52 netserv300 sshd[24678]: Connection from 222.186.30.235 port 16423 on 178.63.236.18 port 22
Jul 30 17:12:56 netserv300 sshd[24893]: Connection from 222.186.30.235 port 59950 on 188.40.78.229 port 22
Jul 30 17:12:56 netser........
------------------------------
2019-08-02 03:36:35
45.49.73.181 attackbots
Automatic report - Banned IP Access
2019-08-02 03:13:38
222.186.15.110 attack
Aug  1 21:36:07 amit sshd\[29136\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.110  user=root
Aug  1 21:36:09 amit sshd\[29136\]: Failed password for root from 222.186.15.110 port 12693 ssh2
Aug  1 21:36:16 amit sshd\[29138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.110  user=root
...
2019-08-02 03:44:38
1.6.160.228 attack
Aug  1 13:10:49 raspberrypi sshd\[4500\]: Invalid user hj from 1.6.160.228Aug  1 13:10:51 raspberrypi sshd\[4500\]: Failed password for invalid user hj from 1.6.160.228 port 55476 ssh2Aug  1 13:20:01 raspberrypi sshd\[4771\]: Invalid user linker from 1.6.160.228
...
2019-08-02 03:22:07
147.135.195.254 attackspam
Aug  1 14:54:07 debian sshd\[29298\]: Invalid user son from 147.135.195.254 port 53324
Aug  1 14:54:07 debian sshd\[29298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.195.254
Aug  1 14:54:09 debian sshd\[29298\]: Failed password for invalid user son from 147.135.195.254 port 53324 ssh2
...
2019-08-02 03:26:34
179.96.132.36 attackbotsspam
SMTP-sasl brute force
...
2019-08-02 03:20:59
184.105.247.203 attack
Honeypot attack, port: 23, PTR: scan-14b.shadowserver.org.
2019-08-02 03:36:04

Recently Reported IPs

79.186.90.35 37.185.143.231 76.212.69.80 108.91.136.68
119.42.86.48 156.218.230.13 128.157.81.86 99.205.90.143
112.124.169.210 202.71.59.35 109.153.161.88 108.3.202.220
59.38.13.54 223.202.93.185 178.55.173.94 136.174.136.145
187.102.65.80 104.238.132.40 216.120.96.250 193.197.146.204