Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.22.213.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8998
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;107.22.213.137.			IN	A

;; AUTHORITY SECTION:
.			593	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022052401 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 25 04:18:52 CST 2022
;; MSG SIZE  rcvd: 107
Host info
137.213.22.107.in-addr.arpa domain name pointer ec2-107-22-213-137.compute-1.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
137.213.22.107.in-addr.arpa	name = ec2-107-22-213-137.compute-1.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
125.130.63.187 attack
Brute-force attempt banned
2020-09-19 06:47:46
178.217.173.54 attackbotsspam
Sep 19 00:32:40 *hidden* sshd[24832]: Invalid user user from 178.217.173.54 port 44378 Sep 19 00:32:40 *hidden* sshd[24832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.217.173.54 Sep 19 00:32:42 *hidden* sshd[24832]: Failed password for invalid user user from 178.217.173.54 port 44378 ssh2
2020-09-19 06:38:39
139.155.38.57 attackspam
Brute%20Force%20SSH
2020-09-19 06:57:31
221.15.217.17 attackspambots
Brute-force attempt banned
2020-09-19 06:37:30
41.47.175.150 attackbotsspam
Auto Detect Rule!
proto TCP (SYN), 41.47.175.150:42811->gjan.info:23, len 40
2020-09-19 07:11:16
192.241.234.185 attackbots
Port Scan detected!
...
2020-09-19 07:01:40
95.82.113.164 attack
Email rejected due to spam filtering
2020-09-19 06:58:53
178.62.227.247 attackbotsspam
prod8
...
2020-09-19 06:38:01
178.137.168.177 attackspambots
Sep 18 17:00:56 ssh2 sshd[28650]: Connection from 178.137.168.177 port 35068 on 192.240.101.3 port 22
Sep 18 17:00:58 ssh2 sshd[28650]: Invalid user pi from 178.137.168.177 port 35068
Sep 18 17:00:58 ssh2 sshd[28650]: Failed password for invalid user pi from 178.137.168.177 port 35068 ssh2
...
2020-09-19 06:54:41
210.245.110.9 attack
2020-09-18T20:52:53.361523upcloud.m0sh1x2.com sshd[26954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.245.110.9  user=root
2020-09-18T20:52:55.783082upcloud.m0sh1x2.com sshd[26954]: Failed password for root from 210.245.110.9 port 54941 ssh2
2020-09-19 07:04:11
49.233.69.138 attack
Sep 18 21:12:12 ns382633 sshd\[379\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.69.138  user=root
Sep 18 21:12:15 ns382633 sshd\[379\]: Failed password for root from 49.233.69.138 port 48559 ssh2
Sep 18 21:22:23 ns382633 sshd\[2344\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.69.138  user=root
Sep 18 21:22:25 ns382633 sshd\[2344\]: Failed password for root from 49.233.69.138 port 40394 ssh2
Sep 18 21:25:37 ns382633 sshd\[3187\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.69.138  user=root
2020-09-19 06:43:54
14.235.254.120 attackbots
Unauthorized connection attempt from IP address 14.235.254.120 on Port 445(SMB)
2020-09-19 06:39:49
77.48.121.154 attackspam
21 attempts against mh-ssh on pcx
2020-09-19 06:36:57
198.89.92.162 attackbotsspam
Sep 18 22:28:58 scw-6657dc sshd[6704]: Failed password for root from 198.89.92.162 port 36392 ssh2
Sep 18 22:28:58 scw-6657dc sshd[6704]: Failed password for root from 198.89.92.162 port 36392 ssh2
Sep 18 22:33:02 scw-6657dc sshd[6874]: Invalid user ts3 from 198.89.92.162 port 48054
...
2020-09-19 06:55:04
189.76.12.181 attack
Email rejected due to spam filtering
2020-09-19 06:55:24

Recently Reported IPs

107.22.189.37 107.22.213.251 107.22.3.25 107.22.75.58
107.22.84.188 107.23.109.143 107.23.143.11 107.23.153.108
107.23.162.11 107.23.188.244 107.23.210.19 107.23.217.105
107.23.217.131 107.23.227.20 107.23.241.75 107.23.48.172
107.23.71.163 107.23.79.50 107.23.80.92 107.23.95.49