Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Beijing

Region: Beijing

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 39.107.66.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24696
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;39.107.66.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024111700 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 17 17:38:42 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 142.66.107.39.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.66.107.39.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
89.28.14.239 attack
email spam
2019-12-17 21:09:26
190.109.160.73 attackbotsspam
email spam
2019-12-17 20:54:13
92.50.42.83 attackspambots
email spam
2019-12-17 21:09:01
84.255.203.218 attackbotsspam
email spam
2019-12-17 21:11:24
116.193.220.194 attackspam
email spam
2019-12-17 21:02:40
178.168.19.139 attackspambots
Minecraft server DDoS attack/proxy
2019-12-17 20:58:33
46.44.243.62 attackbots
email spam
2019-12-17 20:47:00
50.205.151.218 attack
email spam
2019-12-17 21:15:01
104.139.74.25 attackspam
Unauthorized connection attempt from IP address 104.139.74.25 on Port 25(SMTP)
2019-12-17 21:04:38
105.22.41.26 attackbots
email spam
2019-12-17 21:03:48
31.47.189.14 attack
Minecraft server DDoS attack/proxy
2019-12-17 20:49:05
104.248.187.231 attackspam
2019-12-17T13:47:53.486137vps751288.ovh.net sshd\[6260\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.187.231  user=centos
2019-12-17T13:47:54.924849vps751288.ovh.net sshd\[6260\]: Failed password for centos from 104.248.187.231 port 58934 ssh2
2019-12-17T13:56:48.252045vps751288.ovh.net sshd\[6342\]: Invalid user smelek from 104.248.187.231 port 59568
2019-12-17T13:56:48.260922vps751288.ovh.net sshd\[6342\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.187.231
2019-12-17T13:56:50.477263vps751288.ovh.net sshd\[6342\]: Failed password for invalid user smelek from 104.248.187.231 port 59568 ssh2
2019-12-17 21:04:08
188.243.58.75 attackbotsspam
proto=tcp  .  spt=53821  .  dpt=25  .     (Found on   Dark List de Dec 17)     (264)
2019-12-17 21:23:16
45.64.137.58 attack
email spam
2019-12-17 20:48:13
186.211.185.106 attackspam
email spam
2019-12-17 21:24:32

Recently Reported IPs

136.182.219.202 253.190.210.66 128.198.0.32 7.7.189.195
28.62.201.232 184.6.220.206 151.82.217.119 35.99.101.54
177.122.138.243 187.132.12.93 2.28.136.7 72.63.123.122
244.154.80.233 109.4.196.48 179.26.143.26 30.155.51.51
201.139.169.13 121.152.60.225 125.87.55.123 172.19.254.159