Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.139.1.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17038
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;108.139.1.107.			IN	A

;; AUTHORITY SECTION:
.			88	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031801 1800 900 604800 86400

;; Query time: 181 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 19 10:11:22 CST 2022
;; MSG SIZE  rcvd: 106
Host info
107.1.139.108.in-addr.arpa domain name pointer server-108-139-1-107.sfo5.r.cloudfront.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
107.1.139.108.in-addr.arpa	name = server-108-139-1-107.sfo5.r.cloudfront.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
198.50.200.80 attackbots
Nov 20 18:14:04 SilenceServices sshd[4988]: Failed password for root from 198.50.200.80 port 45204 ssh2
Nov 20 18:17:41 SilenceServices sshd[6345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.50.200.80
Nov 20 18:17:42 SilenceServices sshd[6345]: Failed password for invalid user xenia from 198.50.200.80 port 53596 ssh2
2019-11-21 01:49:22
150.223.2.123 attackspambots
$f2bV_matches
2019-11-21 02:21:00
118.193.31.20 attackbots
Nov 20 05:09:49 hanapaa sshd\[28626\]: Invalid user ames from 118.193.31.20
Nov 20 05:09:49 hanapaa sshd\[28626\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.193.31.20
Nov 20 05:09:51 hanapaa sshd\[28626\]: Failed password for invalid user ames from 118.193.31.20 port 49200 ssh2
Nov 20 05:15:08 hanapaa sshd\[29020\]: Invalid user ftpget from 118.193.31.20
Nov 20 05:15:08 hanapaa sshd\[29020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.193.31.20
2019-11-21 01:55:56
106.13.11.127 attackspam
Automatic report - Banned IP Access
2019-11-21 02:14:10
212.64.94.157 attackspam
Nov 20 18:44:39 cp sshd[4377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.94.157
Nov 20 18:44:39 cp sshd[4377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.94.157
2019-11-21 02:08:44
45.82.153.77 attackspambots
Nov 20 18:39:12 web1 postfix/smtpd\[9967\]: warning: unknown\[45.82.153.77\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 20 18:39:30 web1 postfix/smtpd\[9972\]: warning: unknown\[45.82.153.77\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 20 18:47:17 web1 postfix/smtpd\[10207\]: warning: unknown\[45.82.153.77\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-21 01:52:46
188.166.54.199 attackbots
Triggered by Fail2Ban at Vostok web server
2019-11-21 02:09:00
200.70.56.204 attackbotsspam
2019-11-20T15:39:09.844979shield sshd\[7557\]: Invalid user sonshaw from 200.70.56.204 port 39472
2019-11-20T15:39:09.850638shield sshd\[7557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.70.56.204
2019-11-20T15:39:11.859779shield sshd\[7557\]: Failed password for invalid user sonshaw from 200.70.56.204 port 39472 ssh2
2019-11-20T15:44:21.027411shield sshd\[8139\]: Invalid user daemon12345678 from 200.70.56.204 port 47530
2019-11-20T15:44:21.032632shield sshd\[8139\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.70.56.204
2019-11-21 02:19:56
159.69.26.237 attackspambots
blocked for 1h
2019-11-21 02:01:02
178.140.190.247 attackspambots
Nov 20 15:43:15 km20725 sshd\[21323\]: Failed password for root from 178.140.190.247 port 49992 ssh2Nov 20 15:43:17 km20725 sshd\[21323\]: Failed password for root from 178.140.190.247 port 49992 ssh2Nov 20 15:43:19 km20725 sshd\[21323\]: Failed password for root from 178.140.190.247 port 49992 ssh2Nov 20 15:43:21 km20725 sshd\[21323\]: Failed password for root from 178.140.190.247 port 49992 ssh2
...
2019-11-21 01:47:43
192.241.169.184 attackbotsspam
Nov 20 16:16:56 vps647732 sshd[32566]: Failed password for root from 192.241.169.184 port 44624 ssh2
...
2019-11-21 02:20:26
178.128.213.126 attackbotsspam
Nov 20 17:40:29 localhost sshd\[27243\]: Invalid user mitsui from 178.128.213.126 port 42024
Nov 20 17:40:29 localhost sshd\[27243\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.213.126
Nov 20 17:40:31 localhost sshd\[27243\]: Failed password for invalid user mitsui from 178.128.213.126 port 42024 ssh2
2019-11-21 02:16:08
24.4.128.213 attack
Nov 20 15:39:34 minden010 sshd[8218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.4.128.213
Nov 20 15:39:36 minden010 sshd[8218]: Failed password for invalid user web2 from 24.4.128.213 port 52536 ssh2
Nov 20 15:43:09 minden010 sshd[9391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.4.128.213
...
2019-11-21 01:55:20
222.186.180.223 attack
Nov 20 18:21:06 localhost sshd\[129005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.223  user=root
Nov 20 18:21:08 localhost sshd\[129005\]: Failed password for root from 222.186.180.223 port 60648 ssh2
Nov 20 18:21:12 localhost sshd\[129005\]: Failed password for root from 222.186.180.223 port 60648 ssh2
Nov 20 18:21:15 localhost sshd\[129005\]: Failed password for root from 222.186.180.223 port 60648 ssh2
Nov 20 18:21:18 localhost sshd\[129005\]: Failed password for root from 222.186.180.223 port 60648 ssh2
...
2019-11-21 02:22:47
49.88.112.116 attack
Nov 20 18:43:36 localhost sshd\[1992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.116  user=root
Nov 20 18:43:38 localhost sshd\[1992\]: Failed password for root from 49.88.112.116 port 48925 ssh2
Nov 20 18:43:40 localhost sshd\[1992\]: Failed password for root from 49.88.112.116 port 48925 ssh2
2019-11-21 01:53:43

Recently Reported IPs

108.138.246.90 108.139.1.115 108.139.1.36 108.139.1.84
108.156.120.11 108.156.120.22 108.157.214.109 108.157.214.120
108.157.214.18 108.157.214.46 108.157.214.63 108.157.214.79
108.157.214.98 108.159.227.119 108.159.227.28 108.160.145.114
108.160.145.78 108.160.146.0 108.160.151.144 108.160.158.207