Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Shanghai

Region: Shanghai

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.141.54.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35243
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;119.141.54.138.			IN	A

;; AUTHORITY SECTION:
.			461	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020070601 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jul 07 08:11:41 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 138.54.141.119.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.54.141.119.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
207.180.224.198 attackspambots
<6 unauthorized SSH connections
2019-10-19 18:56:12
212.83.138.75 attack
k+ssh-bruteforce
2019-10-19 19:18:44
112.161.203.170 attackbotsspam
Invalid user stats from 112.161.203.170 port 33474
2019-10-19 19:16:21
223.72.63.80 attackbotsspam
Oct 19 13:53:29 hosting sshd[14741]: Invalid user pass@1234567 from 223.72.63.80 port 23295
...
2019-10-19 19:34:58
114.118.1.130 attackspam
ECShop Remote Code Execution Vulnerability
2019-10-19 19:26:31
79.118.196.33 attackbotsspam
(Oct 19)  LEN=44 TTL=55 ID=49614 TCP DPT=8080 WINDOW=34166 SYN 
 (Oct 19)  LEN=44 TTL=55 ID=28313 TCP DPT=8080 WINDOW=44126 SYN 
 (Oct 18)  LEN=44 TTL=55 ID=60765 TCP DPT=8080 WINDOW=44126 SYN 
 (Oct 17)  LEN=44 TTL=55 ID=23720 TCP DPT=8080 WINDOW=44126 SYN 
 (Oct 17)  LEN=44 TTL=55 ID=3509 TCP DPT=8080 WINDOW=44126 SYN 
 (Oct 17)  LEN=44 TTL=55 ID=57678 TCP DPT=8080 WINDOW=44126 SYN 
 (Oct 17)  LEN=44 TTL=55 ID=697 TCP DPT=8080 WINDOW=34166 SYN 
 (Oct 17)  LEN=44 TTL=55 ID=7905 TCP DPT=8080 WINDOW=34166 SYN 
 (Oct 15)  LEN=44 TTL=55 ID=41356 TCP DPT=8080 WINDOW=44126 SYN 
 (Oct 15)  LEN=44 TTL=55 ID=32152 TCP DPT=8080 WINDOW=34166 SYN 
 (Oct 15)  LEN=44 TTL=55 ID=31730 TCP DPT=8080 WINDOW=34166 SYN
2019-10-19 19:16:50
139.199.193.202 attackbotsspam
$f2bV_matches
2019-10-19 19:25:32
106.12.89.118 attackbots
Lines containing failures of 106.12.89.118
Oct 17 01:34:59 mellenthin sshd[2278]: User r.r from 106.12.89.118 not allowed because not listed in AllowUsers
Oct 17 01:34:59 mellenthin sshd[2278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.89.118  user=r.r
Oct 17 01:35:01 mellenthin sshd[2278]: Failed password for invalid user r.r from 106.12.89.118 port 33844 ssh2
Oct 17 01:35:02 mellenthin sshd[2278]: Received disconnect from 106.12.89.118 port 33844:11: Bye Bye [preauth]
Oct 17 01:35:02 mellenthin sshd[2278]: Disconnected from invalid user r.r 106.12.89.118 port 33844 [preauth]
Oct 17 01:58:59 mellenthin sshd[3410]: Invalid user vali from 106.12.89.118 port 57318
Oct 17 01:58:59 mellenthin sshd[3410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.89.118
Oct 17 01:59:01 mellenthin sshd[3410]: Failed password for invalid user vali from 106.12.89.118 port 57318 ssh2
Oct 17 0........
------------------------------
2019-10-19 19:13:23
77.42.116.96 attackbotsspam
19/10/18@23:45:17: FAIL: IoT-Telnet address from=77.42.116.96
...
2019-10-19 19:24:02
46.101.206.205 attackbotsspam
Oct 19 04:35:46 vps58358 sshd\[7189\]: Invalid user padmin from 46.101.206.205Oct 19 04:35:48 vps58358 sshd\[7189\]: Failed password for invalid user padmin from 46.101.206.205 port 34706 ssh2Oct 19 04:40:54 vps58358 sshd\[7285\]: Invalid user jingjucai from 46.101.206.205Oct 19 04:40:56 vps58358 sshd\[7285\]: Failed password for invalid user jingjucai from 46.101.206.205 port 45808 ssh2Oct 19 04:45:41 vps58358 sshd\[7303\]: Invalid user claudiu from 46.101.206.205Oct 19 04:45:43 vps58358 sshd\[7303\]: Failed password for invalid user claudiu from 46.101.206.205 port 56914 ssh2
...
2019-10-19 19:07:46
101.53.154.38 attack
WordPress wp-login brute force :: 101.53.154.38 0.044 BYPASS [19/Oct/2019:21:58:57  1100] [censored_2] "POST /wp-login.php HTTP/1.1" 200 4630 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-19 19:25:06
51.79.129.252 attack
Oct 19 07:54:28 ns381471 sshd[26973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.129.252
Oct 19 07:54:30 ns381471 sshd[26973]: Failed password for invalid user junk from 51.79.129.252 port 41688 ssh2
Oct 19 07:59:38 ns381471 sshd[27162]: Failed password for root from 51.79.129.252 port 53468 ssh2
2019-10-19 18:56:32
185.209.0.90 attack
10/19/2019-12:37:16.623622 185.209.0.90 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-19 19:27:24
198.98.53.76 attackbots
$f2bV_matches
2019-10-19 19:15:22
118.25.214.4 attackbotsspam
Oct 19 08:47:01 DAAP sshd[16767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.214.4  user=root
Oct 19 08:47:03 DAAP sshd[16767]: Failed password for root from 118.25.214.4 port 40000 ssh2
Oct 19 08:52:24 DAAP sshd[16806]: Invalid user ab from 118.25.214.4 port 49338
Oct 19 08:52:24 DAAP sshd[16806]: Invalid user ab from 118.25.214.4 port 49338
...
2019-10-19 19:39:08

Recently Reported IPs

115.61.145.156 113.140.154.90 203.209.198.140 213.223.172.125
36.239.47.251 193.176.215.168 110.213.144.111 18.24.9.172
106.215.238.102 221.45.23.13 201.27.135.253 152.78.186.50
146.145.247.158 189.112.81.246 14.236.38.161 167.71.75.199
72.11.18.185 152.166.60.11 141.41.236.131 88.83.90.171