Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bridgeton

Region: Missouri

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.209.102.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28310
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;107.209.102.139.		IN	A

;; AUTHORITY SECTION:
.			236	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023100301 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 04 06:56:59 CST 2023
;; MSG SIZE  rcvd: 108
Host info
139.102.209.107.in-addr.arpa domain name pointer 107-209-102-139.lightspeed.stlsmo.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.102.209.107.in-addr.arpa	name = 107-209-102-139.lightspeed.stlsmo.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
210.92.91.199 attackbotsspam
SSH Brute-Force. Ports scanning.
2020-07-25 07:40:32
49.232.59.246 attackspambots
Invalid user did from 49.232.59.246 port 45936
2020-07-25 07:53:16
145.239.78.111 attackspam
" "
2020-07-25 07:48:36
125.136.119.38 attackspam
Port Scan detected!
...
2020-07-25 07:44:42
125.132.73.14 attack
Invalid user zd from 125.132.73.14 port 54750
2020-07-25 08:02:52
157.43.193.120 attackbots
Unauthorized connection attempt from IP address 157.43.193.120 on Port 445(SMB)
2020-07-25 08:01:47
38.130.113.160 attackspam
Unauthorized connection attempt from IP address 38.130.113.160 on Port 445(SMB)
2020-07-25 07:56:11
60.164.250.12 attackspambots
Jul 25 01:03:39 ns381471 sshd[10096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.164.250.12
Jul 25 01:03:41 ns381471 sshd[10096]: Failed password for invalid user store from 60.164.250.12 port 55211 ssh2
2020-07-25 07:50:02
79.7.229.120 attackbots
Unauthorized connection attempt from IP address 79.7.229.120 on Port 445(SMB)
2020-07-25 07:41:54
106.12.166.167 attackbotsspam
2020-07-24T21:55:33.417371dmca.cloudsearch.cf sshd[30439]: Invalid user vae from 106.12.166.167 port 15659
2020-07-24T21:55:33.422467dmca.cloudsearch.cf sshd[30439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.166.167
2020-07-24T21:55:33.417371dmca.cloudsearch.cf sshd[30439]: Invalid user vae from 106.12.166.167 port 15659
2020-07-24T21:55:35.307569dmca.cloudsearch.cf sshd[30439]: Failed password for invalid user vae from 106.12.166.167 port 15659 ssh2
2020-07-24T22:01:00.095060dmca.cloudsearch.cf sshd[30532]: Invalid user jing from 106.12.166.167 port 25662
2020-07-24T22:01:00.100275dmca.cloudsearch.cf sshd[30532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.166.167
2020-07-24T22:01:00.095060dmca.cloudsearch.cf sshd[30532]: Invalid user jing from 106.12.166.167 port 25662
2020-07-24T22:01:02.878395dmca.cloudsearch.cf sshd[30532]: Failed password for invalid user jing from 106.12.166.1
...
2020-07-25 07:40:11
87.61.93.3 attack
Ssh brute force
2020-07-25 08:00:10
186.182.82.214 attackbotsspam
Unauthorized connection attempt from IP address 186.182.82.214 on Port 445(SMB)
2020-07-25 07:51:20
61.183.139.131 attack
2020-07-24T23:24:36.536194shield sshd\[30933\]: Invalid user bcd from 61.183.139.131 port 43836
2020-07-24T23:24:36.544774shield sshd\[30933\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.183.139.131
2020-07-24T23:24:38.931304shield sshd\[30933\]: Failed password for invalid user bcd from 61.183.139.131 port 43836 ssh2
2020-07-24T23:30:03.446753shield sshd\[31624\]: Invalid user testsite from 61.183.139.131 port 57680
2020-07-24T23:30:03.455530shield sshd\[31624\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.183.139.131
2020-07-25 07:55:07
45.124.144.116 attackspambots
'Fail2Ban'
2020-07-25 07:53:48
49.234.52.104 attackbotsspam
49.234.52.104 has been banned for [WebApp Attack]
...
2020-07-25 07:31:30

Recently Reported IPs

253.34.138.220 73.12.242.29 20.157.136.229 105.223.6.163
206.10.233.130 221.64.6.159 240.20.182.199 15.173.220.230
75.75.60.98 220.124.201.18 21.43.165.115 233.6.53.148
77.52.229.192 67.63.158.55 174.22.22.112 13.210.135.189
31.24.155.164 106.133.113.144 80.60.61.240 45.138.110.45