Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.149.53.180
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22073
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.149.53.180.			IN	A

;; AUTHORITY SECTION:
.			477	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022012401 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 25 03:45:24 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 180.53.149.134.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 134.149.53.180.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
27.78.14.83 attackbots
SSH-bruteforce attempts
2020-01-01 17:05:34
187.16.96.37 attackspambots
Jan  1 06:35:18 ws22vmsma01 sshd[243945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.16.96.37
Jan  1 06:35:20 ws22vmsma01 sshd[243945]: Failed password for invalid user leckich from 187.16.96.37 port 36422 ssh2
...
2020-01-01 17:41:16
106.12.28.10 attackspambots
Jan  1 06:13:41 raspberrypi sshd\[15949\]: Invalid user margo from 106.12.28.10Jan  1 06:13:43 raspberrypi sshd\[15949\]: Failed password for invalid user margo from 106.12.28.10 port 60310 ssh2Jan  1 06:42:12 raspberrypi sshd\[17144\]: Invalid user stick from 106.12.28.10Jan  1 06:42:13 raspberrypi sshd\[17144\]: Failed password for invalid user stick from 106.12.28.10 port 54272 ssh2
...
2020-01-01 17:39:49
212.237.46.158 attackbotsspam
Host Scan
2020-01-01 17:22:21
192.99.36.177 attack
Web App Attack
2020-01-01 17:15:45
52.166.239.180 attackspam
Invalid user pradeep from 52.166.239.180 port 53338
2020-01-01 17:43:10
173.249.12.113 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-01 17:23:27
185.234.216.140 attackspambots
Jan  1 05:59:05 heicom postfix/smtpd\[20206\]: warning: unknown\[185.234.216.140\]: SASL LOGIN authentication failed: authentication failure
Jan  1 06:13:50 heicom postfix/smtpd\[20462\]: warning: unknown\[185.234.216.140\]: SASL LOGIN authentication failed: authentication failure
Jan  1 06:24:47 heicom postfix/smtpd\[20760\]: warning: unknown\[185.234.216.140\]: SASL LOGIN authentication failed: authentication failure
Jan  1 06:35:38 heicom postfix/smtpd\[20845\]: warning: unknown\[185.234.216.140\]: SASL LOGIN authentication failed: authentication failure
Jan  1 06:46:34 heicom postfix/smtpd\[21004\]: warning: unknown\[185.234.216.140\]: SASL LOGIN authentication failed: authentication failure
...
2020-01-01 17:37:28
138.97.23.190 attackspambots
Invalid user og from 138.97.23.190 port 36778
2020-01-01 17:13:08
203.137.182.54 attackspambots
Jan  1 09:04:13 vh1 sshd[25983]: Did not receive identification string from 203.137.182.54
Jan  1 09:06:48 vh1 sshd[26023]: Did not receive identification string from 203.137.182.54


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=203.137.182.54
2020-01-01 17:30:57
27.78.12.22 attackspam
Unauthorized connection attempt detected from IP address 27.78.12.22 to port 22
2020-01-01 17:11:29
198.108.66.109 attackspam
3389BruteforceFW21
2020-01-01 17:15:19
194.180.224.249 attackbotsspam
WEB_SERVER 403 Forbidden
2020-01-01 17:18:50
180.243.190.163 attack
1577859947 - 01/01/2020 07:25:47 Host: 180.243.190.163/180.243.190.163 Port: 445 TCP Blocked
2020-01-01 17:06:11
106.13.114.228 attack
Jan  1 06:24:06 v22018086721571380 sshd[7111]: Failed password for invalid user pcap from 106.13.114.228 port 52914 ssh2
Jan  1 07:25:33 v22018086721571380 sshd[13735]: Failed password for invalid user semler from 106.13.114.228 port 35666 ssh2
2020-01-01 17:16:01

Recently Reported IPs

203.116.83.160 25.104.62.27 222.36.59.225 192.168.86.23
248.183.213.98 59.99.59.95 170.128.48.16 94.131.23.80
220.94.243.3 170.128.141.28 250.216.71.90 170.128.178.102
45.60.123.207 168.43.174.39 40.38.219.19 213.205.71.0
203.171.167.243 255.34.106.82 200.163.59.212 113.94.193.107