Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
1.1.140.126 attackspambots
unauthorized connection attempt
2020-02-19 16:59:24
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.1.140.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6953
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.1.140.54.			IN	A

;; AUTHORITY SECTION:
.			359	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022401 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 04:38:59 CST 2022
;; MSG SIZE  rcvd: 103
Host info
54.140.1.1.in-addr.arpa domain name pointer node-2eu.pool-1-1.dynamic.totinternet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
54.140.1.1.in-addr.arpa	name = node-2eu.pool-1-1.dynamic.totinternet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
213.108.134.156 attack
PP2P Brute-Force, RDP Brute-Force
2021-01-27 16:31:27
98.186.254.1 attack
Logged in to my email cox communications Why would they be logging into my email
2021-01-15 06:14:22
2600:387:b:9a2::50 attacknormal
Ip banned from multiple websites fro this IP. Pro tip, im on a mobilr device NOT in washington where it says its at. So... Yeah.
2021-01-19 01:20:17
153.63.253.200 spambotsattackproxynormal
Sex
2021-01-14 09:53:50
105.245.116.160 spambotsattackproxynormal
I want my phone today is long day u will see it
2021-01-14 21:52:46
118.185.130.194 botsattack
Feb  3 23:46:03 h2909433 sshd[4786]: Invalid user hi from 118.185.130.194 port 63176
Feb  3 23:46:03 h2909433 sshd[4786]: pam_unix(sshd:auth): check pass; user unknown
Feb  3 23:46:03 h2909433 sshd[4786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.185.130.194
Feb  3 23:46:06 h2909433 sshd[4786]: Failed password for invalid user hi from 118.185.130.194 port 63176 ssh2
Feb  3 23:46:06 h2909433 sshd[4786]: Received disconnect from 118.185.130.194 port 63176:11: Bye Bye [preauth]
Feb  3 23:46:06 h2909433 sshd[4786]: Disconnected from invalid user hi 118.185.130.194 port 63176 [preauth]
Feb  3 23:47:01 h2909433 CRON[4799]: pam_unix(cron:session): session opened for user root by (uid=0)
Feb  3 23:47:01 h2909433 CRON[4799]: pam_unix(cron:session): session closed for user root
Feb  3 23:48:37 h2909433 sshd[4814]: Invalid user ek from 118.185.130.194 port 28855
Feb  3 23:48:38 h sshd[4814]: pam_unix(sshd:auth): check pass; user unknown
Feb  3 23:48:38 h sshd[4814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.185.130.194
Feb  3 23:48:39 h sshd[4814]: Failed password for invalid user ek from 118.185.130.194 port 28855 ssh2
Feb  3 23:50:01 h CRON[4828]: pam_unix(cron:session): session opened for user psaadm by (uid=0)
Feb  3 23:50:02 h CRON[4828]: pam_unix(cron:session): session closed for user psaadm
2021-02-04 07:32:47
124.158.112.70 spambotsattackproxynormal
Program download
2021-01-25 16:53:14
136.228.175.181 spamattacknormal
Kh
2021-01-17 21:59:07
111.90.150.83 spam
Used for phishing attempts from vodafone
2021-01-12 03:19:26
185.63.253.200 normal
Yy
2021-01-24 20:46:15
153.63.253.200 spambotsattackproxynormal
Apa
2021-01-14 09:53:33
185.24.136.9 spambotsattackproxynormal
Canbelog
2021-01-19 19:48:54
174.254.192.174 spamattack
Hhhv
2021-01-25 16:40:07
185.153.197.180 attack
port scan
2021-01-12 04:10:11
128.127.104.97 spambotsattackproxynormal
i want the password
2021-01-14 11:09:27

Recently Reported IPs

1.1.140.34 1.1.140.74 1.1.141.106 1.1.141.161
1.1.142.113 1.1.142.120 1.1.142.130 112.83.157.199
1.1.142.208 1.1.142.25 1.1.142.254 1.1.142.41
1.1.143.109 1.1.143.129 1.1.143.15 1.1.143.18
1.1.143.189 1.1.143.62 1.1.143.74 1.1.143.81