Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.129.80.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25513
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;146.129.80.54.			IN	A

;; AUTHORITY SECTION:
.			305	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 00:17:20 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 54.80.129.146.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.80.129.146.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
197.55.79.234 attackspambots
ssh failed login
2019-06-23 09:49:43
51.77.222.160 attackspambots
Jun 23 00:20:13 MK-Soft-VM5 sshd\[31071\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.222.160  user=root
Jun 23 00:20:15 MK-Soft-VM5 sshd\[31071\]: Failed password for root from 51.77.222.160 port 36986 ssh2
Jun 23 00:20:46 MK-Soft-VM5 sshd\[31073\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.222.160  user=root
...
2019-06-23 09:43:54
188.226.151.23 attackbots
[munged]::443 188.226.151.23 - - [23/Jun/2019:03:03:56 +0200] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 188.226.151.23 - - [23/Jun/2019:03:03:58 +0200] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 188.226.151.23 - - [23/Jun/2019:03:03:58 +0200] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 188.226.151.23 - - [23/Jun/2019:03:04:01 +0200] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 188.226.151.23 - - [23/Jun/2019:03:04:01 +0200] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 188.226.151.23 - - [23/Jun/2019:03:04:03 +0200] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11
2019-06-23 09:39:12
189.51.104.209 attack
SMTP-sasl brute force
...
2019-06-23 09:51:37
218.92.0.181 attackbots
May  7 10:09:24 microserver sshd[45188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.181  user=root
May  7 10:09:26 microserver sshd[45188]: Failed password for root from 218.92.0.181 port 11814 ssh2
May  7 10:09:29 microserver sshd[45188]: Failed password for root from 218.92.0.181 port 11814 ssh2
May  7 10:09:32 microserver sshd[45188]: Failed password for root from 218.92.0.181 port 11814 ssh2
May  7 10:09:34 microserver sshd[45188]: Failed password for root from 218.92.0.181 port 11814 ssh2
Jun 16 16:33:40 microserver sshd[59775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.181  user=root
Jun 16 16:33:42 microserver sshd[59775]: Failed password for root from 218.92.0.181 port 18959 ssh2
Jun 16 16:33:44 microserver sshd[59775]: Failed password for root from 218.92.0.181 port 18959 ssh2
Jun 16 16:33:47 microserver sshd[59775]: Failed password for root from 218.92.0.181 port 18959 ssh2
Jun 16 16:33:50 mi
2019-06-23 09:45:08
184.58.236.201 attackspam
Jun 23 01:36:19 debian sshd\[24500\]: Invalid user admin from 184.58.236.201 port 59464
Jun 23 01:36:19 debian sshd\[24500\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.58.236.201
...
2019-06-23 10:04:26
186.96.102.198 attackbots
Jun 23 02:20:03 pornomens sshd\[13384\]: Invalid user neng from 186.96.102.198 port 38012
Jun 23 02:20:03 pornomens sshd\[13384\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.96.102.198
Jun 23 02:20:05 pornomens sshd\[13384\]: Failed password for invalid user neng from 186.96.102.198 port 38012 ssh2
...
2019-06-23 10:06:20
178.62.54.79 attack
Jun 23 02:17:23 mail sshd\[9388\]: Invalid user help from 178.62.54.79 port 37908
Jun 23 02:17:24 mail sshd\[9388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.54.79
Jun 23 02:17:25 mail sshd\[9388\]: Failed password for invalid user help from 178.62.54.79 port 37908 ssh2
Jun 23 02:18:35 mail sshd\[9484\]: Invalid user tanja from 178.62.54.79 port 52058
Jun 23 02:18:35 mail sshd\[9484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.54.79
2019-06-23 09:32:11
198.108.67.55 attackbots
firewall-block, port(s): 1250/tcp
2019-06-23 09:57:04
51.77.52.216 attackspambots
1,39-03/04 concatform PostRequest-Spammer scoring: Lusaka01
2019-06-23 10:15:49
143.0.140.248 attackbots
23.06.2019 02:21:08 - Login Fail on hMailserver 
Detected by ELinOX-hMail-A2F
2019-06-23 09:33:04
103.196.43.114 attackbots
[munged]::443 103.196.43.114 - - [23/Jun/2019:03:38:00 +0200] "POST /[munged]: HTTP/1.1" 200 9078 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 103.196.43.114 - - [23/Jun/2019:03:38:04 +0200] "POST /[munged]: HTTP/1.1" 200 9078 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 103.196.43.114 - - [23/Jun/2019:03:38:04 +0200] "POST /[munged]: HTTP/1.1" 200 9078 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 103.196.43.114 - - [23/Jun/2019:03:38:07 +0200] "POST /[munged]: HTTP/1.1" 200 9078 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 103.196.43.114 - - [23/Jun/2019:03:38:07 +0200] "POST /[munged]: HTTP/1.1" 200 9078 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 103.196.43.114 - - [23/Jun/2019:03:38:11 +0200] "POST /[munged]: HTTP/1.1" 200 9078 "-" "Mozilla/5.0 (X11
2019-06-23 10:13:46
112.166.68.193 attackspambots
2019-06-23T02:42:40.645912scmdmz1 sshd\[29184\]: Invalid user seigneur from 112.166.68.193 port 48740
2019-06-23T02:42:40.649098scmdmz1 sshd\[29184\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.166.68.193
2019-06-23T02:42:42.415486scmdmz1 sshd\[29184\]: Failed password for invalid user seigneur from 112.166.68.193 port 48740 ssh2
...
2019-06-23 09:50:40
103.85.8.228 attack
Jun 23 02:15:25 mail sshd\[9140\]: Invalid user ilog from 103.85.8.228 port 16606
Jun 23 02:15:25 mail sshd\[9140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.85.8.228
Jun 23 02:15:27 mail sshd\[9140\]: Failed password for invalid user ilog from 103.85.8.228 port 16606 ssh2
Jun 23 02:16:55 mail sshd\[9264\]: Invalid user db2inst from 103.85.8.228 port 17128
Jun 23 02:16:55 mail sshd\[9264\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.85.8.228
2019-06-23 09:34:03
106.13.88.44 attack
Jun 23 02:19:37 tux-35-217 sshd\[8298\]: Invalid user rot from 106.13.88.44 port 45948
Jun 23 02:19:37 tux-35-217 sshd\[8298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.88.44
Jun 23 02:19:39 tux-35-217 sshd\[8298\]: Failed password for invalid user rot from 106.13.88.44 port 45948 ssh2
Jun 23 02:20:47 tux-35-217 sshd\[8300\]: Invalid user marek from 106.13.88.44 port 55046
Jun 23 02:20:47 tux-35-217 sshd\[8300\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.88.44
...
2019-06-23 09:43:09

Recently Reported IPs

133.254.23.78 178.177.190.200 200.138.223.156 17.148.111.127
132.14.30.49 137.66.97.138 179.103.250.58 137.93.208.215
117.62.105.66 62.91.93.225 206.125.166.11 194.183.221.113
98.40.216.243 185.228.152.142 235.6.182.217 127.200.132.79
189.242.181.116 115.11.149.80 227.35.148.167 10.144.238.159