Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 127.107.103.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55996
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;127.107.103.142.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 08:51:08 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 142.103.107.127.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.103.107.127.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
141.98.10.211 attackspam
2020-09-16T03:03:49.511544dreamphreak.com sshd[309748]: Invalid user admin from 141.98.10.211 port 41251
2020-09-16T03:03:51.743203dreamphreak.com sshd[309748]: Failed password for invalid user admin from 141.98.10.211 port 41251 ssh2
...
2020-09-16 16:24:42
149.202.160.188 attackbots
Sep 16 08:32:29 rotator sshd\[6539\]: Address 149.202.160.188 maps to ip-149-202-160.eu, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Sep 16 08:32:31 rotator sshd\[6539\]: Failed password for root from 149.202.160.188 port 55526 ssh2Sep 16 08:36:15 rotator sshd\[7325\]: Address 149.202.160.188 maps to ip-149-202-160.eu, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Sep 16 08:36:17 rotator sshd\[7325\]: Failed password for root from 149.202.160.188 port 32853 ssh2Sep 16 08:40:09 rotator sshd\[7564\]: Address 149.202.160.188 maps to ip-149-202-160.eu, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Sep 16 08:40:11 rotator sshd\[7564\]: Failed password for root from 149.202.160.188 port 38407 ssh2
...
2020-09-16 16:28:26
45.163.108.29 attackbotsspam
Automatic report - Port Scan Attack
2020-09-16 16:17:51
103.243.128.121 attackspambots
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-09-16 16:53:27
159.89.194.103 attackspam
Sep 16 10:08:16 jane sshd[8189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.194.103 
Sep 16 10:08:19 jane sshd[8189]: Failed password for invalid user admin from 159.89.194.103 port 39790 ssh2
...
2020-09-16 16:28:08
162.213.16.215 attackbots
Brute forcing email accounts
2020-09-16 16:45:48
201.102.59.240 attackspam
2020-09-16T06:45:03.255873vps-d63064a2 sshd[35615]: User root from 201.102.59.240 not allowed because not listed in AllowUsers
2020-09-16T06:45:05.702747vps-d63064a2 sshd[35615]: Failed password for invalid user root from 201.102.59.240 port 50086 ssh2
2020-09-16T06:52:24.163360vps-d63064a2 sshd[35678]: User root from 201.102.59.240 not allowed because not listed in AllowUsers
2020-09-16T06:52:24.180277vps-d63064a2 sshd[35678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.102.59.240  user=root
2020-09-16T06:52:24.163360vps-d63064a2 sshd[35678]: User root from 201.102.59.240 not allowed because not listed in AllowUsers
2020-09-16T06:52:26.480094vps-d63064a2 sshd[35678]: Failed password for invalid user root from 201.102.59.240 port 60144 ssh2
...
2020-09-16 16:22:05
167.172.220.123 attackbotsspam
(sshd) Failed SSH login from 167.172.220.123 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 16 00:33:39 server2 sshd[26925]: Invalid user stampede from 167.172.220.123
Sep 16 00:33:39 server2 sshd[26925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.220.123 
Sep 16 00:33:41 server2 sshd[26925]: Failed password for invalid user stampede from 167.172.220.123 port 43710 ssh2
Sep 16 00:39:34 server2 sshd[328]: Invalid user iris from 167.172.220.123
Sep 16 00:39:34 server2 sshd[328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.220.123
2020-09-16 16:53:53
1.54.251.233 attackspambots
Sep 15 18:58:36 rancher-0 sshd[67130]: Invalid user service from 1.54.251.233 port 49632
Sep 15 18:58:39 rancher-0 sshd[67130]: Failed password for invalid user service from 1.54.251.233 port 49632 ssh2
...
2020-09-16 16:20:30
164.132.46.14 attackspam
Sep 16 08:09:04 game-panel sshd[30690]: Failed password for root from 164.132.46.14 port 47292 ssh2
Sep 16 08:13:23 game-panel sshd[31015]: Failed password for root from 164.132.46.14 port 59520 ssh2
Sep 16 08:17:42 game-panel sshd[31154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.46.14
2020-09-16 16:34:35
191.235.100.83 attackbots
2020-09-16T07:44:58.953262shield sshd\[17707\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.235.100.83  user=root
2020-09-16T07:45:00.910244shield sshd\[17707\]: Failed password for root from 191.235.100.83 port 38374 ssh2
2020-09-16T07:49:54.302937shield sshd\[20105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.235.100.83  user=root
2020-09-16T07:49:56.561234shield sshd\[20105\]: Failed password for root from 191.235.100.83 port 47792 ssh2
2020-09-16T07:54:58.890121shield sshd\[21585\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.235.100.83  user=root
2020-09-16 16:50:07
117.34.91.2 attackspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-16 16:21:19
195.54.160.180 attack
Sep 16 08:33:41 jumpserver sshd[74563]: Invalid user admin from 195.54.160.180 port 33153
Sep 16 08:33:43 jumpserver sshd[74563]: Failed password for invalid user admin from 195.54.160.180 port 33153 ssh2
Sep 16 08:33:43 jumpserver sshd[74565]: Invalid user boittier from 195.54.160.180 port 39567
...
2020-09-16 16:34:04
138.201.200.50 attackbotsspam
15.09.2020 18:58:25 - Bad Robot 
Ignore Robots.txt
2020-09-16 16:29:55
159.65.84.164 attackbotsspam
Sep 16 01:18:24 ns3164893 sshd[6740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.84.164  user=root
Sep 16 01:18:26 ns3164893 sshd[6740]: Failed password for root from 159.65.84.164 port 57810 ssh2
...
2020-09-16 16:40:12

Recently Reported IPs

87.243.210.161 254.78.48.84 123.49.13.57 56.170.195.79
248.133.251.83 185.60.186.25 232.0.38.105 190.248.191.32
252.11.27.253 209.213.0.71 122.53.202.238 206.102.136.133
87.11.241.32 3.72.163.42 108.26.44.10 69.178.2.152
204.133.62.23 229.144.177.42 179.120.216.195 125.151.64.151