Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.247.214.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38377
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;107.247.214.242.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 00:27:57 CST 2025
;; MSG SIZE  rcvd: 108
Host info
242.214.247.107.in-addr.arpa domain name pointer mobile-107-247-214-242.mycingular.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.214.247.107.in-addr.arpa	name = mobile-107-247-214-242.mycingular.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
109.106.139.225 attackbotsspam
proto=tcp  .  spt=54276  .  dpt=25  .     (listed on Blocklist de  Jun 29)     (776)
2019-07-01 03:55:38
120.86.96.217 attackbotsspam
23/tcp
[2019-06-30]1pkt
2019-07-01 04:03:08
27.9.251.248 attackbots
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-01 03:59:39
200.69.204.143 attackspambots
Jun 30 15:12:20 dev0-dcde-rnet sshd[1372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.69.204.143
Jun 30 15:12:22 dev0-dcde-rnet sshd[1372]: Failed password for invalid user pc from 200.69.204.143 port 36001 ssh2
Jun 30 15:15:46 dev0-dcde-rnet sshd[1385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.69.204.143
2019-07-01 04:18:07
202.97.188.139 attackbots
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-01 03:54:54
182.255.63.57 attackbotsspam
Jun 30 22:17:08 dedicated sshd[17947]: Invalid user test from 182.255.63.57 port 54412
2019-07-01 04:20:12
141.98.10.33 attack
Rude login attack (18 tries in 1d)
2019-07-01 04:07:45
177.101.139.136 attackspambots
SSH Bruteforce Attack
2019-07-01 04:02:35
5.206.140.109 attack
Honeypot attack, port: 23, PTR: apn-5-206-140-109.vodafone.hu.
2019-07-01 04:22:57
177.91.81.172 attackbotsspam
$f2bV_matches
2019-07-01 04:37:48
159.89.13.0 attackbots
Jul  1 02:12:32 localhost sshd[17551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.13.0  user=root
Jul  1 02:12:34 localhost sshd[17551]: Failed password for root from 159.89.13.0 port 51598 ssh2
Jul  1 02:14:29 localhost sshd[17593]: Invalid user both from 159.89.13.0 port 47098
...
2019-07-01 03:56:36
185.36.81.168 attack
Rude login attack (16 tries in 1d)
2019-07-01 03:58:10
223.19.110.34 attack
TCP port 445 (SMB) attempt blocked by firewall. [2019-06-30 15:14:14]
2019-07-01 04:25:28
202.71.14.103 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2019-07-01 04:21:01
117.96.253.153 attackbotsspam
Honeypot attack, port: 81, PTR: abts-north-dynamic-153.253.96.117.airtelbroadband.in.
2019-07-01 04:25:58

Recently Reported IPs

193.178.129.19 29.249.170.156 199.217.187.169 121.250.124.121
51.124.251.93 118.176.236.66 31.157.231.112 196.179.165.178
145.225.216.104 69.61.163.240 100.59.162.114 136.205.18.110
44.130.167.248 63.76.238.101 197.125.150.113 249.221.127.71
86.239.239.132 19.87.249.2 167.118.163.111 238.233.198.119