Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Ghana

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 154.172.149.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5629
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;154.172.149.64.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022801 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 04:20:03 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 64.149.172.154.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 64.149.172.154.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
167.71.143.84 attack
2019-11-05 01:28:15,656 fail2ban.actions        [1798]: NOTICE  [sshd] Ban 167.71.143.84
2019-11-05 16:18:41
222.186.175.161 attackbotsspam
Tried sshing with brute force.
2019-11-05 16:45:05
50.116.101.52 attack
Nov  5 09:01:40 dedicated sshd[17566]: Invalid user matrix123 from 50.116.101.52 port 45650
2019-11-05 16:24:36
150.109.52.25 attackbots
2019-11-05T08:09:30.406444abusebot-7.cloudsearch.cf sshd\[13707\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.52.25  user=root
2019-11-05 16:35:44
40.73.116.245 attackbots
Nov  5 08:52:10 sauna sshd[241941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.116.245
Nov  5 08:52:12 sauna sshd[241941]: Failed password for invalid user operator from 40.73.116.245 port 45816 ssh2
...
2019-11-05 16:31:48
45.76.33.4 bots
vultr.com的ip,host信息:45.76.33.4.vultr.com(owned by Choopa and located in Haarlem (Haarlem-Oost), Netherlands)
2019-11-05 16:39:43
91.121.142.225 attack
Nov  4 22:16:19 web1 sshd\[24104\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.142.225  user=root
Nov  4 22:16:21 web1 sshd\[24104\]: Failed password for root from 91.121.142.225 port 33712 ssh2
Nov  4 22:20:29 web1 sshd\[24477\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.142.225  user=root
Nov  4 22:20:31 web1 sshd\[24477\]: Failed password for root from 91.121.142.225 port 43918 ssh2
Nov  4 22:24:47 web1 sshd\[24823\]: Invalid user ubnt from 91.121.142.225
Nov  4 22:24:47 web1 sshd\[24823\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.142.225
2019-11-05 16:36:43
163.172.133.109 attack
Nov  5 07:28:21 MK-Soft-Root1 sshd[17241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.133.109 
Nov  5 07:28:23 MK-Soft-Root1 sshd[17241]: Failed password for invalid user mc from 163.172.133.109 port 35836 ssh2
...
2019-11-05 16:14:13
216.144.251.86 attack
'Fail2Ban'
2019-11-05 16:17:05
103.252.250.107 attackbotsspam
Nov  5 08:38:06 ns381471 sshd[18467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.252.250.107
Nov  5 08:38:08 ns381471 sshd[18467]: Failed password for invalid user valhalla from 103.252.250.107 port 43576 ssh2
2019-11-05 16:09:49
117.207.148.60 attackspam
Chat Spam
2019-11-05 16:36:06
180.76.36.226 attackspambots
Nov  5 07:57:57 localhost sshd\[22756\]: Invalid user jira from 180.76.36.226
Nov  5 07:57:57 localhost sshd\[22756\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.36.226
Nov  5 07:57:59 localhost sshd\[22756\]: Failed password for invalid user jira from 180.76.36.226 port 58556 ssh2
Nov  5 08:03:25 localhost sshd\[23003\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.36.226  user=root
Nov  5 08:03:28 localhost sshd\[23003\]: Failed password for root from 180.76.36.226 port 38952 ssh2
...
2019-11-05 16:33:01
212.109.28.225 attackbots
TCP Port Scanning
2019-11-05 16:39:22
111.125.70.104 attackbots
Unauthorised access (Nov  5) SRC=111.125.70.104 LEN=52 TOS=0x08 PREC=0x20 TTL=111 ID=29409 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Nov  5) SRC=111.125.70.104 LEN=52 TOS=0x08 PREC=0x20 TTL=111 ID=4848 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Nov  5) SRC=111.125.70.104 LEN=52 TOS=0x08 PREC=0x20 TTL=111 ID=24416 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-05 16:41:46
119.115.170.110 attackbots
Fail2Ban Ban Triggered
2019-11-05 16:19:13

Recently Reported IPs

7.166.53.170 139.144.143.203 87.155.243.110 168.220.41.190
230.176.44.33 195.103.97.16 51.219.209.235 80.90.22.187
19.156.19.86 222.62.31.104 140.146.109.36 225.47.161.233
168.240.103.26 211.162.186.41 220.164.71.81 201.60.42.186
9.240.199.211 157.11.255.161 18.23.12.21 124.109.6.131