Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.20.194.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14396
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;107.20.194.39.			IN	A

;; AUTHORITY SECTION:
.			3	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 05:26:03 CST 2022
;; MSG SIZE  rcvd: 106
Host info
39.194.20.107.in-addr.arpa domain name pointer ec2-107-20-194-39.compute-1.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
39.194.20.107.in-addr.arpa	name = ec2-107-20-194-39.compute-1.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
165.22.78.222 attack
Feb 17 05:44:17 ovpn sshd\[30888\]: Invalid user adonai from 165.22.78.222
Feb 17 05:44:17 ovpn sshd\[30888\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.78.222
Feb 17 05:44:20 ovpn sshd\[30888\]: Failed password for invalid user adonai from 165.22.78.222 port 48118 ssh2
Feb 17 05:57:10 ovpn sshd\[1837\]: Invalid user contact from 165.22.78.222
Feb 17 05:57:10 ovpn sshd\[1837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.78.222
2020-02-17 16:59:15
121.201.17.102 attackbotsspam
$f2bV_matches
2020-02-17 16:54:41
45.143.222.107 spam
[2020/02/17 15:47:35] [45.143.222.107:2100-0] User luxnet@luxnetcorp.com.tw AUTH fails.
[2020/02/17 15:47:37] [45.143.222.107:2101-0] User luxnet@luxnetcorp.com.tw AUTH fails.
[2020/02/17 15:47:38] [45.143.222.107:2101-0] User luxnet@luxnetcorp.com.tw AUTH fails.
[2020/02/17 15:47:40] [45.143.222.107:2100-0] User luxnet@luxnetcorp.com.tw AUTH fails.
[2020/02/17 15:47:52] [45.143.222.107:2095-0] User luxnet@luxnetcorp.com.tw AUTH fails.
[
2020-02-17 16:45:18
203.113.243.36 attackbots
SSH login attempts.
2020-02-17 16:53:37
196.218.37.194 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 16:52:20
196.218.55.248 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 16:19:50
188.59.146.90 attackbots
SSH login attempts.
2020-02-17 16:49:11
68.178.213.244 attackspambots
SSH login attempts.
2020-02-17 16:56:01
103.100.210.151 attackbotsspam
Feb 17 05:53:55 legacy sshd[6905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.100.210.151
Feb 17 05:53:57 legacy sshd[6905]: Failed password for invalid user tony from 103.100.210.151 port 40185 ssh2
Feb 17 05:57:13 legacy sshd[7094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.100.210.151
...
2020-02-17 16:58:00
176.113.115.101 attack
VPN Brute force
2020-02-17 16:51:28
222.186.175.212 attackspambots
Feb 17 00:58:04 debian sshd[32541]: Unable to negotiate with 222.186.175.212 port 15272: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth]
Feb 17 03:23:11 debian sshd[6787]: Unable to negotiate with 222.186.175.212 port 39984: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth]
...
2020-02-17 16:31:41
196.218.45.172 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 16:42:27
52.71.85.236 attackspambots
SSH login attempts.
2020-02-17 16:38:39
52.41.25.158 attackspam
SSH login attempts.
2020-02-17 16:52:03
216.58.211.14 attack
SSH login attempts.
2020-02-17 16:42:09

Recently Reported IPs

107.20.195.237 107.20.200.34 107.20.199.88 107.20.205.16
107.20.187.32 107.20.186.72 107.20.209.20 107.20.216.153
107.20.210.225 107.20.223.197 107.20.220.31 107.20.222.104
107.20.23.118 107.20.225.1 107.20.225.194 107.20.229.81
107.20.224.65 107.20.225.211 107.20.231.141 107.20.232.105