Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Frankfurt am Main

Region: Hessen

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.40.183.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60565
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.40.183.54.			IN	A

;; AUTHORITY SECTION:
.			155	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060500 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 05 14:27:16 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 54.183.40.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.183.40.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
181.40.84.218 attack
Unauthorized connection attempt from IP address 181.40.84.218 on Port 445(SMB)
2019-08-15 11:20:53
139.162.122.110 attackbots
" "
2019-08-15 11:47:04
49.234.79.176 attackspam
Aug 15 06:47:09 server sshd\[20187\]: Invalid user recruit from 49.234.79.176 port 53476
Aug 15 06:47:09 server sshd\[20187\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.79.176
Aug 15 06:47:10 server sshd\[20187\]: Failed password for invalid user recruit from 49.234.79.176 port 53476 ssh2
Aug 15 06:51:05 server sshd\[27641\]: Invalid user web from 49.234.79.176 port 53182
Aug 15 06:51:05 server sshd\[27641\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.79.176
2019-08-15 12:05:38
182.61.36.21 attack
Aug 15 06:04:28 tuotantolaitos sshd[14781]: Failed password for root from 182.61.36.21 port 37290 ssh2
...
2019-08-15 11:25:38
42.230.35.85 attackspam
Splunk® : port scan detected:
Aug 14 19:30:34 testbed kernel: Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=82:c6:52:d1:6e:53:64:c3:d6:0b:ef:f0:08:00 SRC=42.230.35.85 DST=104.248.11.191 LEN=40 TOS=0x00 PREC=0x00 TTL=47 ID=15197 PROTO=TCP SPT=54119 DPT=8080 WINDOW=55049 RES=0x00 SYN URGP=0
2019-08-15 11:52:10
103.21.12.172 attack
Unauthorized connection attempt from IP address 103.21.12.172 on Port 445(SMB)
2019-08-15 11:18:45
5.114.38.30 attack
Unauthorized connection attempt from IP address 5.114.38.30 on Port 445(SMB)
2019-08-15 11:49:21
154.120.225.134 attackspam
Aug 15 06:06:46 server sshd\[10495\]: Invalid user jabber from 154.120.225.134 port 49762
Aug 15 06:06:46 server sshd\[10495\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.120.225.134
Aug 15 06:06:48 server sshd\[10495\]: Failed password for invalid user jabber from 154.120.225.134 port 49762 ssh2
Aug 15 06:12:31 server sshd\[11423\]: Invalid user nyx from 154.120.225.134 port 45407
Aug 15 06:12:31 server sshd\[11423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.120.225.134
2019-08-15 11:23:36
75.67.19.117 attackbots
2019-08-15T02:54:00.557390abusebot-6.cloudsearch.cf sshd\[27216\]: Invalid user proxyuser from 75.67.19.117 port 37854
2019-08-15 11:23:52
115.159.185.71 attackspambots
Aug 15 04:47:01 debian sshd\[8306\]: Invalid user monitor from 115.159.185.71 port 54468
Aug 15 04:47:01 debian sshd\[8306\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.185.71
...
2019-08-15 12:06:13
185.176.27.114 attackbotsspam
08/14/2019-22:48:34.301212 185.176.27.114 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-08-15 12:07:00
95.58.194.148 attackspam
Aug 15 04:02:29 debian sshd\[7040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.58.194.148  user=root
Aug 15 04:02:30 debian sshd\[7040\]: Failed password for root from 95.58.194.148 port 39086 ssh2
...
2019-08-15 11:19:03
103.2.232.186 attackbots
Aug 15 05:36:49 tux-35-217 sshd\[27715\]: Invalid user 123456 from 103.2.232.186 port 53754
Aug 15 05:36:49 tux-35-217 sshd\[27715\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.2.232.186
Aug 15 05:36:51 tux-35-217 sshd\[27715\]: Failed password for invalid user 123456 from 103.2.232.186 port 53754 ssh2
Aug 15 05:41:56 tux-35-217 sshd\[27733\]: Invalid user zaq1xsw2cde3vfr4 from 103.2.232.186 port 44166
Aug 15 05:41:56 tux-35-217 sshd\[27733\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.2.232.186
...
2019-08-15 11:57:09
163.172.12.172 attack
abasicmove.de 163.172.12.172 \[15/Aug/2019:01:30:57 +0200\] "POST /wp-login.php HTTP/1.1" 200 5758 "-" "Mozilla/5.0 \(Windows NT 6.1\; WOW64\; rv:61.0.1\) Gecko/20120101 Firefox/61.0.1"
abasicmove.de 163.172.12.172 \[15/Aug/2019:01:30:58 +0200\] "POST /wp-login.php HTTP/1.1" 200 5561 "-" "Mozilla/5.0 \(Windows NT 6.1\; WOW64\; rv:61.0.1\) Gecko/20120101 Firefox/61.0.1"
2019-08-15 11:21:39
51.254.33.188 attack
Aug 15 06:24:44 yabzik sshd[15181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.33.188
Aug 15 06:24:46 yabzik sshd[15181]: Failed password for invalid user admin from 51.254.33.188 port 57176 ssh2
Aug 15 06:28:59 yabzik sshd[16977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.33.188
2019-08-15 11:30:13

Recently Reported IPs

173.211.42.171 27.167.112.166 71.129.105.19 163.69.233.229
197.2.186.106 117.78.1.122 226.15.14.62 151.148.59.140
28.87.148.65 157.122.61.84 108.120.42.92 211.64.107.241
71.173.170.194 162.88.79.44 156.235.124.67 30.247.27.10
154.103.145.73 209.28.70.181 117.6.248.164 171.127.81.55