Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Korea

Internet Service Provider: LG Dacom Corporation

Hostname: unknown

Organization: LG DACOM Corporation

Usage Type: unknown

Comments:
Type Details Datetime
attack
2019-11-23T21:43:07.833355suse-nuc sshd[16233]: Invalid user admin from 1.213.195.154 port 50157
...
2020-09-27 04:55:24
attackbots
2019-11-23T21:43:07.833355suse-nuc sshd[16233]: Invalid user admin from 1.213.195.154 port 50157
...
2020-09-26 21:07:39
attackspambots
2019-11-23T21:43:07.833355suse-nuc sshd[16233]: Invalid user admin from 1.213.195.154 port 50157
...
2020-09-26 12:49:52
attackbotsspam
Feb 20 21:04:09 server sshd\[28549\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.213.195.154  user=bin
Feb 20 21:04:11 server sshd\[28549\]: Failed password for bin from 1.213.195.154 port 20657 ssh2
Feb 20 21:15:45 server sshd\[31434\]: Invalid user tomcat from 1.213.195.154
Feb 20 21:15:45 server sshd\[31434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.213.195.154 
Feb 20 21:15:47 server sshd\[31434\]: Failed password for invalid user tomcat from 1.213.195.154 port 47864 ssh2
...
2020-02-21 03:37:22
attack
2020-02-16T16:57:10.3383551240 sshd\[9262\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.213.195.154  user=root
2020-02-16T16:57:13.0211761240 sshd\[9262\]: Failed password for root from 1.213.195.154 port 9580 ssh2
2020-02-16T17:01:10.8750841240 sshd\[9459\]: Invalid user ubuntu from 1.213.195.154 port 24854
2020-02-16T17:01:10.8776931240 sshd\[9459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.213.195.154
...
2020-02-17 02:06:45
attack
Feb 14 23:49:13 MK-Soft-Root1 sshd[3083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.213.195.154 
Feb 14 23:49:15 MK-Soft-Root1 sshd[3083]: Failed password for invalid user carlos from 1.213.195.154 port 49272 ssh2
...
2020-02-15 06:51:58
attackbotsspam
Feb  3 07:59:33 ws24vmsma01 sshd[123339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.213.195.154
Feb  3 07:59:35 ws24vmsma01 sshd[123339]: Failed password for invalid user vpn from 1.213.195.154 port 35504 ssh2
...
2020-02-03 19:28:37
attackbots
Unauthorized connection attempt detected from IP address 1.213.195.154 to port 2220 [J]
2020-01-29 19:58:14
attack
Jan 27 19:41:58 SilenceServices sshd[30972]: Failed password for root from 1.213.195.154 port 46239 ssh2
Jan 27 19:44:03 SilenceServices sshd[5927]: Failed password for root from 1.213.195.154 port 12019 ssh2
2020-01-28 03:09:00
attackspam
Jan 22 06:57:23 SilenceServices sshd[13853]: Failed password for root from 1.213.195.154 port 48559 ssh2
Jan 22 06:59:52 SilenceServices sshd[14801]: Failed password for root from 1.213.195.154 port 10907 ssh2
Jan 22 07:01:51 SilenceServices sshd[15691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.213.195.154
2020-01-22 14:07:50
attackbots
Jan 21 06:08:56 ovpn sshd\[5836\]: Invalid user support from 1.213.195.154
Jan 21 06:08:56 ovpn sshd\[5836\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.213.195.154
Jan 21 06:08:58 ovpn sshd\[5836\]: Failed password for invalid user support from 1.213.195.154 port 14131 ssh2
Jan 21 06:10:08 ovpn sshd\[6141\]: Invalid user postgres from 1.213.195.154
Jan 21 06:10:08 ovpn sshd\[6141\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.213.195.154
2020-01-21 13:33:43
attack
Jan 14 17:06:02 master sshd[22824]: Failed password for invalid user ftpuser from 1.213.195.154 port 46362 ssh2
2020-01-14 23:34:16
attack
Jan 11 15:13:10 server sshd\[27359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.213.195.154  user=root
Jan 11 15:13:12 server sshd\[27359\]: Failed password for root from 1.213.195.154 port 28367 ssh2
Jan 11 21:18:18 server sshd\[20761\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.213.195.154  user=root
Jan 11 21:18:20 server sshd\[20761\]: Failed password for root from 1.213.195.154 port 11069 ssh2
Jan 12 02:32:51 server sshd\[4648\]: Invalid user tanya from 1.213.195.154
Jan 12 02:32:51 server sshd\[4648\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.213.195.154 
...
2020-01-12 07:54:31
attackbotsspam
Automatic report - Banned IP Access
2020-01-02 16:12:29
attack
Triggered by Fail2Ban at Vostok web server
2020-01-02 03:28:25
attackspam
Dec 26 16:08:24 ws22vmsma01 sshd[52554]: Failed password for root from 1.213.195.154 port 40638 ssh2
...
2019-12-27 04:23:58
attack
Dec 26 07:53:34 markkoudstaal sshd[18883]: Failed password for root from 1.213.195.154 port 56693 ssh2
Dec 26 07:56:58 markkoudstaal sshd[19115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.213.195.154
Dec 26 07:57:00 markkoudstaal sshd[19115]: Failed password for invalid user user1 from 1.213.195.154 port 15739 ssh2
2019-12-26 15:21:47
attackspam
--- report ---
Dec 18 14:14:15 sshd: Connection from 1.213.195.154 port 50119
Dec 18 14:14:16 sshd: Invalid user user from 1.213.195.154 port 50119
Dec 18 14:14:18 sshd: Failed password for invalid user user from 1.213.195.154 port 50119 ssh2
Dec 18 14:14:19 sshd: Received disconnect from 1.213.195.154 port 50119:11: Normal Shutdown, Thank you for playing [preauth]
2019-12-19 02:23:58
attackbots
Dec 17 13:59:32 vmd26974 sshd[27780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.213.195.154
Dec 17 13:59:34 vmd26974 sshd[27780]: Failed password for invalid user ubuntu from 1.213.195.154 port 49350 ssh2
...
2019-12-17 21:17:58
attackspam
2019-12-02 21:44:57,135 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 1.213.195.154
2019-12-02 22:18:08,740 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 1.213.195.154
2019-12-02 22:50:21,240 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 1.213.195.154
2019-12-02 23:32:04,160 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 1.213.195.154
2019-12-03 00:02:24,277 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 1.213.195.154
...
2019-12-09 04:48:07
attackbots
Dec  2 11:56:58 icinga sshd[5023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.213.195.154
Dec  2 11:57:01 icinga sshd[5023]: Failed password for invalid user dominque from 1.213.195.154 port 35373 ssh2
...
2019-12-02 19:45:43
attackspam
ssh brute force
2019-11-25 16:15:03
attackbots
Nov 25 06:59:41 ncomp sshd[6784]: Invalid user david from 1.213.195.154
Nov 25 06:59:41 ncomp sshd[6784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.213.195.154
Nov 25 06:59:41 ncomp sshd[6784]: Invalid user david from 1.213.195.154
Nov 25 06:59:43 ncomp sshd[6784]: Failed password for invalid user david from 1.213.195.154 port 60137 ssh2
2019-11-25 13:05:22
attackbotsspam
Nov  6 07:32:25 nextcloud sshd\[3133\]: Invalid user password from 1.213.195.154
Nov  6 07:32:25 nextcloud sshd\[3133\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.213.195.154
Nov  6 07:32:27 nextcloud sshd\[3133\]: Failed password for invalid user password from 1.213.195.154 port 50896 ssh2
...
2019-11-06 14:57:43
attackspam
$f2bV_matches_ltvn
2019-10-23 18:52:27
attack
SSH Brute Force, server-1 sshd[13235]: Failed password for root from 1.213.195.154 port 40840 ssh2
2019-10-21 03:38:54
attackspam
Oct 19 12:39:54 kapalua sshd\[12669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.213.195.154  user=root
Oct 19 12:39:57 kapalua sshd\[12669\]: Failed password for root from 1.213.195.154 port 16329 ssh2
Oct 19 12:44:25 kapalua sshd\[13043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.213.195.154  user=games
Oct 19 12:44:27 kapalua sshd\[13043\]: Failed password for games from 1.213.195.154 port 36197 ssh2
Oct 19 12:49:01 kapalua sshd\[13422\]: Invalid user admin from 1.213.195.154
2019-10-20 07:49:37
attackbots
Oct 17 22:55:41 vpn01 sshd[31453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.213.195.154
Oct 17 22:55:44 vpn01 sshd[31453]: Failed password for invalid user visitor from 1.213.195.154 port 18519 ssh2
...
2019-10-18 04:57:31
attack
SSH authentication failure x 6 reported by Fail2Ban
...
2019-10-17 13:58:08
attack
Oct 12 04:54:48 tdfoods sshd\[29443\]: Invalid user 123 from 1.213.195.154
Oct 12 04:54:48 tdfoods sshd\[29443\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.213.195.154
Oct 12 04:54:49 tdfoods sshd\[29443\]: Failed password for invalid user 123 from 1.213.195.154 port 25454 ssh2
Oct 12 04:59:36 tdfoods sshd\[29867\]: Invalid user Computador_123 from 1.213.195.154
Oct 12 04:59:36 tdfoods sshd\[29867\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.213.195.154
2019-10-13 02:09:06
Comments on same subnet:
IP Type Details Datetime
1.213.195.155 attack
2020-03-08T09:52:54.035531suse-nuc sshd[23180]: Invalid user form-test from 1.213.195.155 port 60741
...
2020-09-27 04:55:05
1.213.195.155 attackbots
2020-03-08T09:52:54.035531suse-nuc sshd[23180]: Invalid user form-test from 1.213.195.155 port 60741
...
2020-09-26 21:07:10
1.213.195.155 attackspambots
2020-03-08T09:52:54.035531suse-nuc sshd[23180]: Invalid user form-test from 1.213.195.155 port 60741
...
2020-09-26 12:49:21
1.213.195.155 attackspam
Mar 24 04:53:05 XXX sshd[41464]: Invalid user capra from 1.213.195.155 port 22488
2020-03-24 12:01:09
1.213.195.155 attack
Too many connections or unauthorized access detected from Arctic banned ip
2020-03-24 02:47:53
1.213.195.155 attackspam
2020-03-22T16:19:45.064903abusebot.cloudsearch.cf sshd[4242]: Invalid user rita from 1.213.195.155 port 16717
2020-03-22T16:19:45.070391abusebot.cloudsearch.cf sshd[4242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.213.195.155
2020-03-22T16:19:45.064903abusebot.cloudsearch.cf sshd[4242]: Invalid user rita from 1.213.195.155 port 16717
2020-03-22T16:19:46.635131abusebot.cloudsearch.cf sshd[4242]: Failed password for invalid user rita from 1.213.195.155 port 16717 ssh2
2020-03-22T16:25:51.903436abusebot.cloudsearch.cf sshd[4858]: Invalid user leonie from 1.213.195.155 port 36323
2020-03-22T16:25:51.909314abusebot.cloudsearch.cf sshd[4858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.213.195.155
2020-03-22T16:25:51.903436abusebot.cloudsearch.cf sshd[4858]: Invalid user leonie from 1.213.195.155 port 36323
2020-03-22T16:25:54.051312abusebot.cloudsearch.cf sshd[4858]: Failed password for invalid use
...
2020-03-23 01:17:32
1.213.195.155 attack
Mar 20 10:45:11 plusreed sshd[29906]: Invalid user solaris from 1.213.195.155
...
2020-03-21 02:32:25
1.213.195.155 attackspam
Mar 20 09:26:18 areeb-Workstation sshd[2174]: Failed password for root from 1.213.195.155 port 28591 ssh2
...
2020-03-20 13:15:41
1.213.195.155 attack
Mar 10 19:18:04 [munged] sshd[8064]: Failed password for root from 1.213.195.155 port 28158 ssh2
2020-03-11 05:34:35
1.213.195.155 attackspam
Brute-force attempt banned
2020-03-08 06:47:44
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.213.195.154
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47665
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;1.213.195.154.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019040101 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Tue Apr 02 05:09:23 +08 2019
;; MSG SIZE  rcvd: 117

Host info
Host 154.195.213.1.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 154.195.213.1.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
180.177.105.30 attackbotsspam
Unauthorized connection attempt detected from IP address 180.177.105.30 to port 8000
2019-12-31 01:21:46
1.57.173.160 attackspambots
Unauthorized connection attempt detected from IP address 1.57.173.160 to port 23
2019-12-31 01:13:13
119.27.188.47 attackspam
Unauthorized connection attempt detected from IP address 119.27.188.47 to port 23
2019-12-31 01:28:50
202.102.90.226 attackspambots
Unauthorized connection attempt detected from IP address 202.102.90.226 to port 8088
2019-12-31 01:19:15
39.105.44.153 attackbotsspam
Unauthorized connection attempt detected from IP address 39.105.44.153 to port 9200
2019-12-31 01:43:13
118.69.15.206 attackspambots
Unauthorized connection attempt detected from IP address 118.69.15.206 to port 81
2019-12-31 01:29:55
1.1.183.109 attack
Unauthorized connection attempt detected from IP address 1.1.183.109 to port 80
2019-12-31 01:14:58
121.201.61.137 attackspam
Unauthorized connection attempt detected from IP address 121.201.61.137 to port 135
2019-12-31 01:27:15
171.97.123.227 attackbotsspam
Unauthorized connection attempt detected from IP address 171.97.123.227 to port 23
2019-12-31 01:22:16
202.107.188.197 attack
Unauthorized connection attempt detected from IP address 202.107.188.197 to port 23
2019-12-31 01:19:03
117.62.22.209 attackbotsspam
Unauthorized connection attempt detected from IP address 117.62.22.209 to port 80
2019-12-31 01:31:17
125.25.7.173 attackbotsspam
Unauthorized connection attempt detected from IP address 125.25.7.173 to port 23
2019-12-31 01:24:49
85.225.27.39 attackspambots
Unauthorized connection attempt detected from IP address 85.225.27.39 to port 5555
2019-12-31 01:36:32
112.225.79.73 attackbots
Unauthorized connection attempt detected from IP address 112.225.79.73 to port 8080
2019-12-31 01:32:42
49.156.37.53 attackbots
Unauthorized connection attempt detected from IP address 49.156.37.53 to port 23
2019-12-31 01:07:07

Recently Reported IPs

118.96.193.97 206.72.194.199 159.65.158.145 139.59.143.213
62.217.133.188 40.112.198.249 31.209.59.115 103.50.5.174
73.55.47.103 190.217.71.15 164.132.227.37 85.128.142.149
5.211.251.231 121.78.159.150 65.19.185.92 191.5.177.237
134.175.200.70 218.92.0.140 134.209.56.244 107.170.194.191