Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.197.54.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14508
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;107.197.54.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 09:43:53 CST 2025
;; MSG SIZE  rcvd: 107
Host info
142.54.197.107.in-addr.arpa domain name pointer 107-197-54-142.lightspeed.cicril.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.54.197.107.in-addr.arpa	name = 107-197-54-142.lightspeed.cicril.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
111.21.99.227 attackbots
May  3 05:50:42 vpn01 sshd[19381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.21.99.227
May  3 05:50:44 vpn01 sshd[19381]: Failed password for invalid user suporte from 111.21.99.227 port 47552 ssh2
...
2020-05-03 16:59:30
159.89.131.172 attackbots
May  2 20:26:28 web9 sshd\[2807\]: Invalid user rowena from 159.89.131.172
May  2 20:26:28 web9 sshd\[2807\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.131.172
May  2 20:26:30 web9 sshd\[2807\]: Failed password for invalid user rowena from 159.89.131.172 port 49060 ssh2
May  2 20:29:46 web9 sshd\[3227\]: Invalid user wangy from 159.89.131.172
May  2 20:29:46 web9 sshd\[3227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.131.172
2020-05-03 16:37:41
222.186.42.136 attackbots
May  3 10:31:15 plex sshd[16399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.136  user=root
May  3 10:31:16 plex sshd[16399]: Failed password for root from 222.186.42.136 port 42275 ssh2
2020-05-03 16:42:38
111.40.50.116 attack
May  3 06:46:54 *** sshd[12358]: User root from 111.40.50.116 not allowed because not listed in AllowUsers
2020-05-03 16:33:29
49.150.231.126 attackspam
1588477851 - 05/03/2020 05:50:51 Host: 49.150.231.126/49.150.231.126 Port: 445 TCP Blocked
2020-05-03 16:53:31
62.75.252.43 attack
Fail2Ban Ban Triggered
2020-05-03 16:45:38
41.224.250.200 attackbotsspam
DATE:2020-05-03 05:50:58, IP:41.224.250.200, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-05-03 16:48:23
36.26.95.179 attack
May  3 05:55:20 ns382633 sshd\[19024\]: Invalid user chieh from 36.26.95.179 port 63988
May  3 05:55:20 ns382633 sshd\[19024\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.26.95.179
May  3 05:55:23 ns382633 sshd\[19024\]: Failed password for invalid user chieh from 36.26.95.179 port 63988 ssh2
May  3 06:03:38 ns382633 sshd\[20191\]: Invalid user entry from 36.26.95.179 port 18060
May  3 06:03:38 ns382633 sshd\[20191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.26.95.179
2020-05-03 16:57:41
113.125.159.5 attackspambots
2020-05-03T03:08:47.508201linuxbox-skyline sshd[136188]: Invalid user lhm from 113.125.159.5 port 46890
...
2020-05-03 17:09:38
106.13.232.26 attackspambots
May  2 22:32:28 php1 sshd\[32658\]: Invalid user aiden from 106.13.232.26
May  2 22:32:28 php1 sshd\[32658\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.232.26
May  2 22:32:30 php1 sshd\[32658\]: Failed password for invalid user aiden from 106.13.232.26 port 47588 ssh2
May  2 22:36:54 php1 sshd\[639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.232.26  user=root
May  2 22:36:56 php1 sshd\[639\]: Failed password for root from 106.13.232.26 port 42906 ssh2
2020-05-03 17:04:53
64.227.30.91 attackbots
May  3 06:24:05 marvibiene sshd[23104]: Invalid user ljp from 64.227.30.91 port 41496
May  3 06:24:05 marvibiene sshd[23104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.30.91
May  3 06:24:05 marvibiene sshd[23104]: Invalid user ljp from 64.227.30.91 port 41496
May  3 06:24:07 marvibiene sshd[23104]: Failed password for invalid user ljp from 64.227.30.91 port 41496 ssh2
...
2020-05-03 16:47:02
213.217.0.134 attack
May  3 10:56:05 debian-2gb-nbg1-2 kernel: \[10755069.821717\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=213.217.0.134 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=33427 PROTO=TCP SPT=51050 DPT=63950 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-03 17:06:55
115.159.48.220 attackspambots
(sshd) Failed SSH login from 115.159.48.220 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May  3 05:44:53 amsweb01 sshd[17477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.48.220  user=root
May  3 05:44:55 amsweb01 sshd[17477]: Failed password for root from 115.159.48.220 port 49160 ssh2
May  3 05:49:05 amsweb01 sshd[17977]: Invalid user fangnan from 115.159.48.220 port 45230
May  3 05:49:07 amsweb01 sshd[17977]: Failed password for invalid user fangnan from 115.159.48.220 port 45230 ssh2
May  3 05:50:43 amsweb01 sshd[18165]: Invalid user reena from 115.159.48.220 port 54576
2020-05-03 16:53:52
36.22.187.34 attackspambots
May  3 06:37:50 srv-ubuntu-dev3 sshd[100363]: Invalid user frappe from 36.22.187.34
May  3 06:37:50 srv-ubuntu-dev3 sshd[100363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.22.187.34
May  3 06:37:50 srv-ubuntu-dev3 sshd[100363]: Invalid user frappe from 36.22.187.34
May  3 06:37:52 srv-ubuntu-dev3 sshd[100363]: Failed password for invalid user frappe from 36.22.187.34 port 58800 ssh2
May  3 06:42:01 srv-ubuntu-dev3 sshd[100999]: Invalid user jft from 36.22.187.34
May  3 06:42:01 srv-ubuntu-dev3 sshd[100999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.22.187.34
May  3 06:42:01 srv-ubuntu-dev3 sshd[100999]: Invalid user jft from 36.22.187.34
May  3 06:42:04 srv-ubuntu-dev3 sshd[100999]: Failed password for invalid user jft from 36.22.187.34 port 56172 ssh2
May  3 06:46:49 srv-ubuntu-dev3 sshd[101774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.22
...
2020-05-03 17:02:24
211.137.254.221 attack
May  3 10:03:18 markkoudstaal sshd[31010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.137.254.221
May  3 10:03:20 markkoudstaal sshd[31010]: Failed password for invalid user jenya from 211.137.254.221 port 55259 ssh2
May  3 10:07:38 markkoudstaal sshd[31733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.137.254.221
2020-05-03 16:42:03

Recently Reported IPs

49.179.49.231 151.145.110.181 192.169.126.77 197.221.191.14
86.198.92.234 144.239.148.125 27.163.167.219 58.230.209.174
146.200.36.61 138.34.213.219 227.211.73.222 135.162.3.162
19.213.151.108 107.119.4.245 21.23.66.242 202.128.149.222
252.170.16.53 75.175.254.20 157.130.190.151 32.3.191.252