Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bangor

Region: Wales

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.143.81.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18439
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;147.143.81.54.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011500 1800 900 604800 86400

;; Query time: 88 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 15 19:43:59 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 54.81.143.147.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.81.143.147.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
217.160.14.60 attack
Jul 15 08:19:01 hosting sshd[21482]: Invalid user fei from 217.160.14.60 port 50740
...
2020-07-15 14:00:09
43.252.229.118 attackbots
Jul 15 05:03:22 server sshd[24860]: Failed password for invalid user skg from 43.252.229.118 port 54662 ssh2
Jul 15 05:04:16 server sshd[26020]: Failed password for invalid user mysql from 43.252.229.118 port 40832 ssh2
Jul 15 05:05:12 server sshd[26993]: Failed password for invalid user event from 43.252.229.118 port 55240 ssh2
2020-07-15 14:09:52
115.146.127.147 attackspambots
xmlrpc attack
2020-07-15 13:29:59
52.149.183.196 attackbots
Jul 15 07:24:16 icecube sshd[9653]: Invalid user admin from 52.149.183.196 port 5860
Jul 15 07:24:16 icecube sshd[9653]: Failed password for invalid user admin from 52.149.183.196 port 5860 ssh2
2020-07-15 13:42:40
104.211.88.245 attack
$f2bV_matches
2020-07-15 13:46:11
191.232.177.26 attackspam
2020-07-15T06:55:03.932874ks3355764 sshd[4944]: Invalid user admin from 191.232.177.26 port 48326
2020-07-15T06:55:06.419803ks3355764 sshd[4944]: Failed password for invalid user admin from 191.232.177.26 port 48326 ssh2
...
2020-07-15 13:34:09
45.145.66.5 attackspam
Port-scan: detected 242 distinct ports within a 24-hour window.
2020-07-15 13:39:18
52.148.71.195 attackbots
2020-07-14T19:00:52.495715devel sshd[16841]: Invalid user admin from 52.148.71.195 port 7627
2020-07-14T19:00:54.575779devel sshd[16841]: Failed password for invalid user admin from 52.148.71.195 port 7627 ssh2
2020-07-15T01:29:12.142761devel sshd[30776]: Invalid user admin from 52.148.71.195 port 1591
2020-07-15 13:53:14
13.77.158.96 attackbots
SSH brute-force attempt
2020-07-15 13:47:57
192.162.102.33 attackbots
TCP Port Scanning
2020-07-15 13:57:32
123.16.230.129 attackbotsspam
1594778561 - 07/15/2020 04:02:41 Host: 123.16.230.129/123.16.230.129 Port: 445 TCP Blocked
2020-07-15 13:56:45
185.176.27.126 attackspam
Port-scan: detected 240 distinct ports within a 24-hour window.
2020-07-15 13:37:38
185.176.27.86 attackbotsspam
SmallBizIT.US 6 packets to tcp(12703,17297,34162,36134,46533,60138)
2020-07-15 13:40:22
40.89.178.126 attackbots
Banned for a week because repeated abuses, for example SSH, but not only
2020-07-15 13:53:45
220.127.148.8 attackspambots
Jul 15 07:37:37 buvik sshd[7902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.127.148.8
Jul 15 07:37:39 buvik sshd[7902]: Failed password for invalid user csvn from 220.127.148.8 port 46462 ssh2
Jul 15 07:40:33 buvik sshd[8490]: Invalid user manager from 220.127.148.8
...
2020-07-15 13:48:51

Recently Reported IPs

6.4.19.64 7.232.58.200 122.171.222.214 221.209.170.36
223.128.144.84 4.127.9.171 107.246.211.10 162.53.106.21
214.77.139.140 188.116.239.254 41.175.34.244 164.69.128.133
72.45.224.23 229.204.141.190 122.175.186.215 172.58.227.110
215.36.215.203 191.225.158.108 220.221.191.210 242.138.139.5