Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.207.142.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52855
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;107.207.142.139.		IN	A

;; AUTHORITY SECTION:
.			415	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022071502 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 16 09:56:20 CST 2022
;; MSG SIZE  rcvd: 108
Host info
139.142.207.107.in-addr.arpa domain name pointer adsl-107-207-142-139.dsl.aus2tx.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.142.207.107.in-addr.arpa	name = adsl-107-207-142-139.dsl.aus2tx.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
194.15.36.19 attackbotsspam
Aug 17 17:38:04 sachi sshd\[23061\]: Invalid user phillip from 194.15.36.19
Aug 17 17:38:04 sachi sshd\[23061\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.15.36.19
Aug 17 17:38:06 sachi sshd\[23061\]: Failed password for invalid user phillip from 194.15.36.19 port 38330 ssh2
Aug 17 17:42:19 sachi sshd\[23484\]: Invalid user jason1 from 194.15.36.19
Aug 17 17:42:19 sachi sshd\[23484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.15.36.19
2019-08-18 11:45:35
172.245.221.53 attackbots
445/tcp
[2019-08-18]1pkt
2019-08-18 11:58:42
62.148.227.85 attackbotsspam
failed_logins
2019-08-18 11:33:06
190.117.157.115 attackspam
Aug 17 17:35:44 lcdev sshd\[5947\]: Invalid user ggggg from 190.117.157.115
Aug 17 17:35:44 lcdev sshd\[5947\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.munialtoalianza.gob.pe
Aug 17 17:35:46 lcdev sshd\[5947\]: Failed password for invalid user ggggg from 190.117.157.115 port 50106 ssh2
Aug 17 17:40:54 lcdev sshd\[6525\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.munialtoalianza.gob.pe  user=root
Aug 17 17:40:56 lcdev sshd\[6525\]: Failed password for root from 190.117.157.115 port 40454 ssh2
2019-08-18 11:44:32
14.162.133.195 attackspam
Excessive Port-Scanning
2019-08-18 11:39:30
78.188.188.141 attackbots
23/tcp
[2019-08-18]1pkt
2019-08-18 11:17:13
167.114.192.162 attackspambots
Automatic report - Banned IP Access
2019-08-18 11:23:52
178.175.132.212 attack
B: Abusive content scan (301)
2019-08-18 12:00:35
118.144.155.254 attack
Aug 18 05:33:12 dedicated sshd[27136]: Invalid user user from 118.144.155.254 port 47043
2019-08-18 11:46:00
37.114.157.138 attackbots
Aug 18 06:09:15 srv-4 sshd\[20704\]: Invalid user admin from 37.114.157.138
Aug 18 06:09:15 srv-4 sshd\[20704\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.114.157.138
Aug 18 06:09:16 srv-4 sshd\[20704\]: Failed password for invalid user admin from 37.114.157.138 port 57338 ssh2
...
2019-08-18 12:02:40
80.21.150.186 attackbotsspam
2019-08-18T03:19:19.678421abusebot-3.cloudsearch.cf sshd\[23079\]: Invalid user newsletter from 80.21.150.186 port 45803
2019-08-18 11:36:15
45.55.187.39 attackspambots
Aug 18 05:09:23 vpn01 sshd\[7425\]: Invalid user fm from 45.55.187.39
Aug 18 05:09:23 vpn01 sshd\[7425\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.187.39
Aug 18 05:09:25 vpn01 sshd\[7425\]: Failed password for invalid user fm from 45.55.187.39 port 33040 ssh2
2019-08-18 11:54:56
185.253.250.42 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-18 11:56:44
222.186.15.101 attackspam
2019-08-18T03:42:56.267545abusebot-7.cloudsearch.cf sshd\[6511\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.101  user=root
2019-08-18 11:43:37
14.205.195.149 attack
8080/tcp
[2019-08-18]1pkt
2019-08-18 11:33:37

Recently Reported IPs

138.207.193.2 107.195.63.217 23.120.182.225 100.8.211.18
88.218.66.166 23.108.15.190 50.117.66.248 154.201.34.19
94.231.218.141 167.99.44.133 139.144.40.107 194.35.226.16
154.202.100.17 45.145.131.164 20.226.40.9 122.177.103.142
82.137.245.79 5.133.122.172 114.35.196.38 121.126.98.122