Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 100.140.53.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45373
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;100.140.53.54.			IN	A

;; AUTHORITY SECTION:
.			441	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022112700 1800 900 604800 86400

;; Query time: 49 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 27 20:30:25 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 54.53.140.100.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.53.140.100.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
104.206.128.74 attackbots
 TCP (SYN) 104.206.128.74:55896 -> port 3389, len 44
2020-10-05 12:03:44
116.101.136.210 attack
445/tcp
[2020-10-03]1pkt
2020-10-05 08:04:52
112.85.42.87 attackbots
Oct  4 23:24:58 ip-172-31-42-142 sshd\[29647\]: Failed password for root from 112.85.42.87 port 27066 ssh2\
Oct  4 23:25:00 ip-172-31-42-142 sshd\[29647\]: Failed password for root from 112.85.42.87 port 27066 ssh2\
Oct  4 23:25:03 ip-172-31-42-142 sshd\[29647\]: Failed password for root from 112.85.42.87 port 27066 ssh2\
Oct  4 23:31:46 ip-172-31-42-142 sshd\[29775\]: Failed password for root from 112.85.42.87 port 46329 ssh2\
Oct  4 23:31:49 ip-172-31-42-142 sshd\[29775\]: Failed password for root from 112.85.42.87 port 46329 ssh2\
2020-10-05 08:00:00
118.27.95.212 attackbots
CMS (WordPress or Joomla) login attempt.
2020-10-05 07:57:44
165.232.41.110 attack
2020-10-04T22:03:21Z - RDP login failed multiple times. (165.232.41.110)
2020-10-05 07:42:11
112.85.42.237 attack
Oct  4 19:54:00 NPSTNNYC01T sshd[11932]: Failed password for root from 112.85.42.237 port 11333 ssh2
Oct  4 19:54:48 NPSTNNYC01T sshd[12064]: Failed password for root from 112.85.42.237 port 21468 ssh2
Oct  4 19:54:50 NPSTNNYC01T sshd[12064]: Failed password for root from 112.85.42.237 port 21468 ssh2
...
2020-10-05 08:08:45
81.37.31.161 attack
Lines containing failures of 81.37.31.161
Oct  4 22:25:02 dns01 sshd[28623]: Did not receive identification string from 81.37.31.161 port 61620
Oct  4 22:25:05 dns01 sshd[28625]: Invalid user sniffer from 81.37.31.161 port 62012
Oct  4 22:25:05 dns01 sshd[28625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.37.31.161
Oct  4 22:25:07 dns01 sshd[28625]: Failed password for invalid user sniffer from 81.37.31.161 port 62012 ssh2
Oct  4 22:25:07 dns01 sshd[28625]: Connection closed by invalid user sniffer 81.37.31.161 port 62012 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=81.37.31.161
2020-10-05 12:04:15
36.77.92.250 attackbots
445/tcp
[2020-10-03]1pkt
2020-10-05 08:14:45
197.98.201.78 attack
445/tcp 445/tcp
[2020-10-03]2pkt
2020-10-05 08:09:57
36.67.217.181 attackbotsspam
445/tcp
[2020-10-03]1pkt
2020-10-05 08:07:38
218.214.92.35 attack
Hits on port : 23
2020-10-05 07:47:55
141.98.9.163 attackbots
Oct  5 02:04:02 s2 sshd[8901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.163 
Oct  5 02:04:03 s2 sshd[8901]: Failed password for invalid user admin from 141.98.9.163 port 32861 ssh2
Oct  5 02:04:24 s2 sshd[8916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.163
2020-10-05 08:13:12
62.234.116.25 attackbots
Oct  4 15:40:32 db sshd[13362]: User root from 62.234.116.25 not allowed because none of user's groups are listed in AllowGroups
...
2020-10-05 08:00:30
200.111.120.180 attackspambots
Oct  5 01:13:03 mout sshd[22424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.111.120.180  user=root
Oct  5 01:13:05 mout sshd[22424]: Failed password for root from 200.111.120.180 port 46630 ssh2
Oct  5 01:13:05 mout sshd[22424]: Disconnected from authenticating user root 200.111.120.180 port 46630 [preauth]
2020-10-05 07:50:23
218.92.0.247 attackbots
Oct  5 05:02:45 mavik sshd[24769]: Failed password for root from 218.92.0.247 port 8407 ssh2
Oct  5 05:02:48 mavik sshd[24769]: Failed password for root from 218.92.0.247 port 8407 ssh2
Oct  5 05:02:52 mavik sshd[24769]: Failed password for root from 218.92.0.247 port 8407 ssh2
Oct  5 05:02:55 mavik sshd[24769]: Failed password for root from 218.92.0.247 port 8407 ssh2
Oct  5 05:02:59 mavik sshd[24769]: Failed password for root from 218.92.0.247 port 8407 ssh2
...
2020-10-05 12:03:29

Recently Reported IPs

10.3.190.195 100.140.86.109 100.141.235.176 100.141.152.40
10.29.4.151 100.144.36.163 100.140.51.96 100.142.215.240
100.14.9.207 100.141.85.194 100.14.56.201 100.144.43.68
100.146.130.36 100.14.24.207 100.14.135.117 10.3.207.177
10.3.143.198 10.3.104.36 100.14.168.16 10.29.92.218