Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.147.242.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38477
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;107.147.242.213.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020500 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 15:14:09 CST 2025
;; MSG SIZE  rcvd: 108
Host info
213.242.147.107.in-addr.arpa domain name pointer syn-107-147-242-213.biz.spectrum.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
213.242.147.107.in-addr.arpa	name = syn-107-147-242-213.biz.spectrum.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
195.62.173.186 attack
spam
2020-02-01 14:40:07
134.159.93.57 attack
Unauthorized connection attempt detected from IP address 134.159.93.57 to port 2220 [J]
2020-02-01 14:38:50
195.154.134.155 attack
Unauthorized connection attempt detected from IP address 195.154.134.155 to port 2220 [J]
2020-02-01 14:39:39
49.88.112.62 attack
Feb  1 07:01:40 srv206 sshd[3669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.62  user=root
Feb  1 07:01:42 srv206 sshd[3669]: Failed password for root from 49.88.112.62 port 58897 ssh2
...
2020-02-01 14:04:16
46.32.60.139 attack
Feb  1 05:57:15 srv206 sshd[3015]: Invalid user minecraft from 46.32.60.139
...
2020-02-01 14:12:40
223.80.240.79 attack
01/31/2020-23:57:02.542859 223.80.240.79 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-02-01 14:24:26
49.233.183.7 attackbotsspam
Unauthorized connection attempt detected from IP address 49.233.183.7 to port 2220 [J]
2020-02-01 14:32:02
89.47.48.63 attack
Tried sshing with brute force.
2020-02-01 14:23:07
113.134.211.42 attack
Invalid user usuario from 113.134.211.42 port 56418
2020-02-01 14:20:45
157.230.40.174 attackbots
Unauthorized connection attempt detected from IP address 157.230.40.174 to port 2220 [J]
2020-02-01 14:33:46
84.20.86.108 attackspam
"GET / HTTP/1.1"

PORT     STATE SERVICE        VERSION
2000/tcp open  bandwidth-test MikroTik bandwidth-test server
8291/tcp open  unknown
2020-02-01 14:45:40
66.249.66.208 attackbotsspam
Automatic report - Banned IP Access
2020-02-01 14:34:09
27.223.89.238 attackbotsspam
Invalid user amala from 27.223.89.238 port 49108
2020-02-01 14:36:52
197.48.53.90 attack
Jan 31 18:57:12 web9 sshd\[3526\]: Invalid user admin from 197.48.53.90
Jan 31 18:57:12 web9 sshd\[3526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.48.53.90
Jan 31 18:57:14 web9 sshd\[3526\]: Failed password for invalid user admin from 197.48.53.90 port 39037 ssh2
Jan 31 18:57:16 web9 sshd\[3536\]: Invalid user admin from 197.48.53.90
Jan 31 18:57:16 web9 sshd\[3536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.48.53.90
2020-02-01 14:13:41
107.152.164.103 attackbotsspam
Unauthorized connection attempt detected, IP banned.
2020-02-01 14:11:43

Recently Reported IPs

115.116.241.186 123.217.65.114 161.189.27.27 236.253.178.80
251.66.219.87 97.209.249.151 209.248.105.179 195.193.53.247
246.249.157.94 174.4.225.206 223.3.222.248 152.124.206.86
97.240.131.239 74.171.22.97 217.123.172.245 74.44.13.165
134.144.105.53 235.72.112.61 137.175.97.185 166.83.192.139