Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.231.225.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62517
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.231.225.54.			IN	A

;; AUTHORITY SECTION:
.			316	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040200 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 02 22:35:46 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 54.225.231.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.225.231.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.198.136.53 attackbotsspam
Unauthorised access (Oct  7) SRC=103.198.136.53 LEN=52 PREC=0x20 TTL=111 ID=9532 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-07 20:12:35
80.85.70.20 attack
Oct  7 02:02:25 tdfoods sshd\[4522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.85.70.20  user=root
Oct  7 02:02:27 tdfoods sshd\[4522\]: Failed password for root from 80.85.70.20 port 41652 ssh2
Oct  7 02:05:40 tdfoods sshd\[4762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.85.70.20  user=root
Oct  7 02:05:43 tdfoods sshd\[4762\]: Failed password for root from 80.85.70.20 port 53444 ssh2
Oct  7 02:09:07 tdfoods sshd\[5170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.85.70.20  user=root
2019-10-07 20:10:15
178.251.108.168 attack
Telnetd brute force attack detected by fail2ban
2019-10-07 20:27:34
92.50.249.166 attackbotsspam
SSH bruteforce
2019-10-07 19:57:08
79.178.52.234 attackspambots
Lines containing failures of 79.178.52.234
Oct  6 11:35:48 server01 postfix/smtpd[21496]: connect from bzq-79-178-52-234.red.bezeqint.net[79.178.52.234]
Oct x@x
Oct x@x
Oct  6 11:35:50 server01 postfix/policy-spf[21552]: : Policy action=550 Please see hxxp://www.openspf.org/Why?s=mfrom;id=znl%40moschkowhostnamez.de;ip=79.178.52.234;r=server01.2800km.de
Oct x@x
Oct  6 11:35:50 server01 postfix/smtpd[21496]: lost connection after DATA from bzq-79-178-52-234.red.bezeqint.net[79.178.52.234]
Oct  6 11:35:50 server01 postfix/smtpd[21496]: disconnect from bzq-79-178-52-234.red.bezeqint.net[79.178.52.234]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=79.178.52.234
2019-10-07 19:55:57
119.196.83.30 attack
Oct  7 07:48:18 debian sshd\[11624\]: Invalid user upload from 119.196.83.30 port 41480
Oct  7 07:48:18 debian sshd\[11624\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.196.83.30
Oct  7 07:48:20 debian sshd\[11624\]: Failed password for invalid user upload from 119.196.83.30 port 41480 ssh2
...
2019-10-07 20:20:30
66.249.70.23 attackspambots
Lines containing failures of 66.249.70.23
/var/log/apache/pucorp.org.log:66.249.70.23 - - [06/Oct/2019:00:30:38 +0200] "GET /robots.txt HTTP/1.1" 200 5892 "-" "Mozilla/5.0 (compatible; Googlebot/2.1; +hxxp://www.google.com/bot.html)"
/var/log/apache/pucorp.org.log:66.249.70.23 - - [06/Oct/2019:00:30:38 +0200] "GET / HTTP/1.1" 200 11492 "-" "Mozilla/5.0 (Linux; user 6.0.1; Nexus 5X Build/MMB29P) AppleWebKhostname/537.36 (KHTML, like Gecko) Chrome/41.0.2272.96 Mobile Safari/537.36 (compatible; Googlebot/2.1; +hxxp://www.google.com/bot.html)"


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=66.249.70.23
2019-10-07 20:02:30
157.245.111.175 attackbotsspam
Automatic report - SSH Brute-Force Attack
2019-10-07 19:56:21
51.77.201.118 attackbots
Oct  7 02:01:22 web9 sshd\[9021\]: Invalid user P@ssword\#1234 from 51.77.201.118
Oct  7 02:01:22 web9 sshd\[9021\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.201.118
Oct  7 02:01:24 web9 sshd\[9021\]: Failed password for invalid user P@ssword\#1234 from 51.77.201.118 port 37608 ssh2
Oct  7 02:05:32 web9 sshd\[9674\]: Invalid user Aa@1234 from 51.77.201.118
Oct  7 02:05:32 web9 sshd\[9674\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.201.118
2019-10-07 20:10:02
111.230.229.106 attackspambots
Oct  7 14:48:59 sauna sshd[225702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.229.106
Oct  7 14:49:01 sauna sshd[225702]: Failed password for invalid user 123@asd from 111.230.229.106 port 45546 ssh2
...
2019-10-07 19:58:06
46.229.168.163 attackbots
Unauthorized access detected from banned ip
2019-10-07 20:06:59
140.143.228.18 attackbots
Oct  7 02:03:24 auw2 sshd\[28215\]: Invalid user Pa\$\$w0rd2017 from 140.143.228.18
Oct  7 02:03:24 auw2 sshd\[28215\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.228.18
Oct  7 02:03:25 auw2 sshd\[28215\]: Failed password for invalid user Pa\$\$w0rd2017 from 140.143.228.18 port 39130 ssh2
Oct  7 02:08:24 auw2 sshd\[28590\]: Invalid user 123Living from 140.143.228.18
Oct  7 02:08:24 auw2 sshd\[28590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.228.18
2019-10-07 20:11:43
31.25.132.156 attackbotsspam
Automatic report - Port Scan Attack
2019-10-07 20:04:33
139.59.169.37 attack
Oct  7 07:41:41 xtremcommunity sshd\[274282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.169.37  user=root
Oct  7 07:41:44 xtremcommunity sshd\[274282\]: Failed password for root from 139.59.169.37 port 53952 ssh2
Oct  7 07:45:15 xtremcommunity sshd\[274367\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.169.37  user=root
Oct  7 07:45:17 xtremcommunity sshd\[274367\]: Failed password for root from 139.59.169.37 port 37808 ssh2
Oct  7 07:48:51 xtremcommunity sshd\[274436\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.169.37  user=root
...
2019-10-07 20:02:54
27.106.0.249 attack
Oct  6 09:08:14 mxgate1 postfix/postscreen[15541]: CONNECT from [27.106.0.249]:56807 to [176.31.12.44]:25
Oct  6 09:08:14 mxgate1 postfix/dnsblog[15543]: addr 27.106.0.249 listed by domain cbl.abuseat.org as 127.0.0.2
Oct  6 09:08:14 mxgate1 postfix/dnsblog[15545]: addr 27.106.0.249 listed by domain zen.spamhaus.org as 127.0.0.3
Oct  6 09:08:14 mxgate1 postfix/dnsblog[15545]: addr 27.106.0.249 listed by domain zen.spamhaus.org as 127.0.0.4
Oct  6 09:08:14 mxgate1 postfix/dnsblog[15545]: addr 27.106.0.249 listed by domain zen.spamhaus.org as 127.0.0.11
Oct  6 09:08:14 mxgate1 postfix/dnsblog[15544]: addr 27.106.0.249 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Oct  6 09:08:14 mxgate1 postfix/postscreen[15541]: PREGREET 21 after 0.13 from [27.106.0.249]:56807: EHLO [27.106.0.249]

Oct  6 09:08:14 mxgate1 postfix/dnsblog[15546]: addr 27.106.0.249 listed by domain b.barracudacentral.org as 127.0.0.2
Oct  6 09:08:14 mxgate1 postfix/postscreen[15541]: DNSBL rank 5 for [........
-------------------------------
2019-10-07 20:25:35

Recently Reported IPs

251.86.192.196 245.246.6.234 45.89.175.177 46.233.120.16
2.111.235.54 46.223.120.16 156.34.220.77 241.219.82.217
206.149.191.211 214.66.25.171 3.131.26.43 93.115.248.135
76.178.89.42 51.36.43.111 250.211.0.202 238.199.60.36
67.175.5.37 51.240.174.221 189.236.59.165 100.190.145.41