Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Pakistan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
118.107.139.181 attack
Unauthorized connection attempt from IP address 118.107.139.181 on Port 445(SMB)
2020-06-02 03:29:28
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.107.139.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43067
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.107.139.157.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024112400 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 24 15:58:11 CST 2024
;; MSG SIZE  rcvd: 108
Host info
157.139.107.118.in-addr.arpa domain name pointer 118-107-139-157.snet.net.pk.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
157.139.107.118.in-addr.arpa	name = 118-107-139-157.snet.net.pk.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.124.98.229 attack
Autoban   103.124.98.229 AUTH/CONNECT
2019-11-18 20:28:30
103.122.255.30 attackspambots
Autoban   103.122.255.30 AUTH/CONNECT
2019-11-18 20:34:00
5.151.126.27 attack
Autoban   5.151.126.27 VIRUS
2019-11-18 20:37:57
66.214.128.80 attack
Automatic report - Port Scan Attack
2019-11-18 20:35:18
194.36.84.58 attackspam
194.36.84.58 - - \[18/Nov/2019:09:50:20 +0100\] "POST /wp-login.php HTTP/1.0" 200 6655 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
194.36.84.58 - - \[18/Nov/2019:09:50:22 +0100\] "POST /wp-login.php HTTP/1.0" 200 6493 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
194.36.84.58 - - \[18/Nov/2019:09:50:24 +0100\] "POST /wp-login.php HTTP/1.0" 200 6492 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-18 20:16:12
103.119.30.201 attack
Autoban   103.119.30.201 AUTH/CONNECT
2019-11-18 20:36:31
5.192.102.126 attackbots
Autoban   5.192.102.126 VIRUS
2019-11-18 20:29:33
183.167.205.103 attackspambots
Autoban   183.167.205.103 ABORTED AUTH
2019-11-18 20:48:32
5.151.126.21 attackbots
Autoban   5.151.126.21 VIRUS
2019-11-18 20:41:12
183.89.237.90 attackspambots
Autoban   183.89.237.90 ABORTED AUTH
2019-11-18 20:38:17
103.116.87.173 attackspambots
postfix
2019-11-18 20:43:44
223.17.181.48 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2019-11-18 20:46:55
5.192.102.44 attack
Autoban   5.192.102.44 VIRUS
2019-11-18 20:15:58
91.132.173.140 attack
TCP Port Scanning
2019-11-18 20:19:02
189.114.67.213 attack
Autoban   189.114.67.213 ABORTED AUTH
2019-11-18 20:12:00

Recently Reported IPs

35.139.212.173 172.185.221.202 216.242.138.151 222.11.29.2
190.61.2.181 51.21.8.209 104.0.0.1 192.168.1.99
136.102.36.134 232.155.66.242 114.100.104.147 146.69.198.103
43.83.113.161 20.181.195.141 213.10.83.42 202.91.94.0
172.19.85.0 143.179.75.210 150.6.90.245 124.111.116.18