Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.54.243.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48847
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.54.243.109.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030600 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 06 23:59:07 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 109.243.54.132.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 132.54.243.109.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
18.183.26.220 attackspam
User agent spoofing, Page: /.git/HEAD/
2020-08-15 08:27:29
45.172.189.74 attackbots
Automatic report - Port Scan Attack
2020-08-15 08:23:06
138.68.245.152 attackbotsspam
$f2bV_matches
2020-08-15 08:25:28
218.28.238.162 attack
Failed password for root from 218.28.238.162 port 46057 ssh2
2020-08-15 08:37:13
95.156.230.161 attack
 TCP (ACK) 95.156.230.161:3389 -> port 48176, len 40
2020-08-15 08:24:04
49.88.112.75 attackspam
Aug 15 02:42:09 ip106 sshd[24088]: Failed password for root from 49.88.112.75 port 54316 ssh2
Aug 15 02:42:11 ip106 sshd[24088]: Failed password for root from 49.88.112.75 port 54316 ssh2
...
2020-08-15 08:53:57
158.140.181.157 attack
firewall-block, port(s): 445/tcp
2020-08-15 08:20:11
37.49.230.130 attackspam
SSH Invalid Login
2020-08-15 08:27:58
139.59.57.2 attackspambots
Aug 15 02:19:59 mout sshd[3344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.57.2  user=root
Aug 15 02:20:01 mout sshd[3344]: Failed password for root from 139.59.57.2 port 59596 ssh2
2020-08-15 08:21:09
202.184.31.64 attackbots
Aug 14 22:34:20 melroy-server sshd[25652]: Failed password for root from 202.184.31.64 port 54852 ssh2
...
2020-08-15 08:37:27
122.172.74.18 attack
Aug 15 01:49:19 *hidden* sshd[16794]: Failed password for *hidden* from 122.172.74.18 port 27201 ssh2 Aug 15 01:53:40 *hidden* sshd[17368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.172.74.18 user=root Aug 15 01:53:42 *hidden* sshd[17368]: Failed password for *hidden* from 122.172.74.18 port 63553 ssh2
2020-08-15 08:39:32
106.51.50.2 attack
Aug 15 04:22:36 serwer sshd\[21090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.50.2  user=root
Aug 15 04:22:38 serwer sshd\[21090\]: Failed password for root from 106.51.50.2 port 48178 ssh2
Aug 15 04:25:42 serwer sshd\[22923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.50.2  user=root
...
2020-08-15 12:02:44
106.75.174.87 attackspam
Bruteforce detected by fail2ban
2020-08-15 08:30:26
50.62.176.241 attackspam
Automatic report - XMLRPC Attack
2020-08-15 08:50:13
83.48.89.147 attackbots
Aug 14 22:39:12 h2829583 sshd[17034]: Failed password for root from 83.48.89.147 port 46830 ssh2
2020-08-15 08:53:33

Recently Reported IPs

123.179.80.38 180.172.154.52 65.225.203.228 17.146.87.21
209.88.160.125 208.134.228.88 104.253.36.38 139.153.45.50
84.179.244.119 247.95.52.178 243.120.149.182 214.181.81.41
101.220.161.242 119.2.8.209 115.24.134.119 118.155.219.98
185.189.236.211 98.227.0.197 172.110.7.133 149.227.208.161