Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: South Wayne

Region: Wisconsin

Country: United States

Internet Service Provider: Bug Tussel Wireless

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       207.200.224.0 - 207.200.255.255
CIDR:           207.200.224.0/19
NetName:        BTW-006
NetHandle:      NET-207-200-224-0-1
Parent:         NET207 (NET-207-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Bug Tussel Wireless (BTWL)
RegDate:        2008-09-30
Updated:        2016-03-10
Ref:            https://rdap.arin.net/registry/ip/207.200.224.0


OrgName:        Bug Tussel Wireless
OrgId:          BTWL
Address:        PO BOX 1060
City:           GREEN BAY
StateProv:      WI
PostalCode:     54305-1060
Country:        US
RegDate:        2013-09-04
Updated:        2024-11-25
Comment:        http://www.bugtusselwireless.com
Ref:            https://rdap.arin.net/registry/entity/BTWL


OrgAbuseHandle: NOC2500-ARIN
OrgAbuseName:   Network Operations Center
OrgAbusePhone:  +1-920-940-0001 
OrgAbuseEmail:  NOC@bugtusselwireless.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/NOC2500-ARIN

OrgTechHandle: NOC2500-ARIN
OrgTechName:   Network Operations Center
OrgTechPhone:  +1-920-940-0001 
OrgTechEmail:  NOC@bugtusselwireless.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NOC2500-ARIN

OrgNOCHandle: NOC2500-ARIN
OrgNOCName:   Network Operations Center
OrgNOCPhone:  +1-920-940-0001 
OrgNOCEmail:  NOC@bugtusselwireless.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/NOC2500-ARIN

# end


# start

NetRange:       207.200.240.0 - 207.200.255.255
CIDR:           207.200.240.0/20
NetName:        MWDC-BLOCK
NetHandle:      NET-207-200-240-0-1
Parent:         BTW-006 (NET-207-200-224-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       Midwest Datacore, LLC (C04845392)
RegDate:        2014-01-14
Updated:        2014-01-14
Comment:        NOC: 920-940-0001
Ref:            https://rdap.arin.net/registry/ip/207.200.240.0


CustName:       Midwest Datacore, LLC
Address:        130 E. Walnut Street
City:           Green Bay
StateProv:      WI
PostalCode:     54301
Country:        US
RegDate:        2014-01-13
Updated:        2016-03-10
Ref:            https://rdap.arin.net/registry/entity/C04845392

OrgAbuseHandle: NOC2500-ARIN
OrgAbuseName:   Network Operations Center
OrgAbusePhone:  +1-920-940-0001 
OrgAbuseEmail:  NOC@bugtusselwireless.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/NOC2500-ARIN

OrgTechHandle: NOC2500-ARIN
OrgTechName:   Network Operations Center
OrgTechPhone:  +1-920-940-0001 
OrgTechEmail:  NOC@bugtusselwireless.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NOC2500-ARIN

OrgNOCHandle: NOC2500-ARIN
OrgNOCName:   Network Operations Center
OrgNOCPhone:  +1-920-940-0001 
OrgNOCEmail:  NOC@bugtusselwireless.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/NOC2500-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 207.200.240.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41583
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;207.200.240.143.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032002 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 21 07:34:39 CST 2026
;; MSG SIZE  rcvd: 108
Host info
b'Host 143.240.200.207.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 207.200.240.143.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
116.113.99.172 attackbots
Unauthorized connection attempt detected from IP address 116.113.99.172 to port 5555 [J]
2020-01-16 01:32:32
168.121.50.168 attackspambots
Jan 14 15:14:48 risk sshd[4390]: Invalid user hwserver from 168.121.50.168
Jan 14 15:14:48 risk sshd[4390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.121.50.168 
Jan 14 15:14:50 risk sshd[4390]: Failed password for invalid user hwserver from 168.121.50.168 port 52958 ssh2
Jan 14 15:16:07 risk sshd[4447]: Invalid user squid from 168.121.50.168
Jan 14 15:16:07 risk sshd[4447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.121.50.168 
Jan 14 15:16:09 risk sshd[4447]: Failed password for invalid user squid from 168.121.50.168 port 60094 ssh2
Jan 14 15:16:40 risk sshd[4454]: Invalid user jasmin from 168.121.50.168
Jan 14 15:16:40 risk sshd[4454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.121.50.168 
Jan 14 15:16:42 risk sshd[4454]: Failed password for invalid user jasmin from 168.121.50.168 port 35404 ssh2


........
-----------------------------------------------
https:
2020-01-16 01:58:05
122.152.226.207 attackspambots
Unauthorized connection attempt detected from IP address 122.152.226.207 to port 3389 [T]
2020-01-16 01:26:38
180.115.40.207 attackbotsspam
Unauthorized connection attempt detected from IP address 180.115.40.207 to port 5555 [T]
2020-01-16 01:22:11
103.225.138.170 attack
Unauthorized connection attempt detected from IP address 103.225.138.170 to port 445 [T]
2020-01-16 01:38:16
27.100.141.149 attackbotsspam
Unauthorized connection attempt detected from IP address 27.100.141.149 to port 82 [J]
2020-01-16 01:48:00
222.43.87.234 attack
Unauthorized connection attempt detected from IP address 222.43.87.234 to port 23 [J]
2020-01-16 01:53:09
183.80.179.199 attack
Unauthorized connection attempt detected from IP address 183.80.179.199 to port 23 [J]
2020-01-16 01:19:53
133.232.89.61 attackbotsspam
Unauthorized connection attempt detected from IP address 133.232.89.61 to port 4567 [J]
2020-01-16 01:24:56
115.29.174.179 attack
Unauthorized connection attempt detected from IP address 115.29.174.179 to port 1433 [T]
2020-01-16 01:33:06
200.122.224.200 attackbotsspam
20/1/15@11:01:24: FAIL: Alarm-Network address from=200.122.224.200
20/1/15@11:01:24: FAIL: Alarm-Network address from=200.122.224.200
...
2020-01-16 01:18:34
164.52.24.179 attack
Unauthorized connection attempt detected from IP address 164.52.24.179 to port 5432 [J]
2020-01-16 01:24:21
182.254.217.198 attack
Unauthorized connection attempt detected from IP address 182.254.217.198 to port 445 [T]
2020-01-16 01:21:00
219.117.193.48 attack
Unauthorized connection attempt detected from IP address 219.117.193.48 to port 22 [T]
2020-01-16 01:53:50
117.157.15.27 attackspam
Unauthorized connection attempt detected from IP address 117.157.15.27 to port 1433 [J]
2020-01-16 01:31:25

Recently Reported IPs

208.122.67.22 159.65.42.149 2606:4700:10::6814:6620 2606:4700:10::6814:9784
2606:4700:10::6816:4647 2606:4700:10::6816:3638 110.78.158.43 2606:4700:10::6814:9161
2606:4700:10::6816:2339 2606:4700:10::6814:4600 2606:4700:10::6814:7823 2606:4700:10::6814:7033
2606:4700:10::6816:4957 2606:4700:10::6814:5038 163.26.15.208 34.93.160.210
192.36.109.83 134.35.157.161 2606:4700:10::6814:8831 2606:4700:10::6816:159