Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 154.72.180.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54238
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;154.72.180.139.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 04:35:54 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 139.180.72.154.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.180.72.154.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
149.56.151.65 attackbotsspam
[Sat Aug 15 05:55:25.343146 2020] [authz_core:error] [pid 13544:tid 140684438779648] [client 149.56.151.65:41474] AH01630: client denied by server configuration: /var/www/vhosts/sololinux.es/httpdocs/wp-includes/css/modules.php
[Sat Aug 15 05:55:25.973848 2020] [authz_core:error] [pid 13542:tid 140684455565056] [client 149.56.151.65:41476] AH01630: client denied by server configuration: /var/www/vhosts/sololinux.es/httpdocs/wso.php
[Sat Aug 15 05:55:26.856309 2020] [authz_core:error] [pid 13663:tid 140684321281792] [client 149.56.151.65:41478] AH01630: client denied by server configuration: /var/www/vhosts/sololinux.es/httpdocs/wp-content/plugins/upspy
[Sat Aug 15 05:55:27.514952 2020] [authz_core:error] [pid 13543:tid 140684562511616] [client 149.56.151.65:41480] AH01630: client denied by server configuration: /var/www/vhosts/sololinux.es/httpdocs/wp-content/plugins/ubh
...
2020-08-15 14:42:46
119.45.50.17 attack
2020-08-15T05:50:22.656641vps-d63064a2 sshd[45460]: User root from 119.45.50.17 not allowed because not listed in AllowUsers
2020-08-15T05:50:24.456089vps-d63064a2 sshd[45460]: Failed password for invalid user root from 119.45.50.17 port 53678 ssh2
2020-08-15T05:51:21.949969vps-d63064a2 sshd[45475]: User root from 119.45.50.17 not allowed because not listed in AllowUsers
2020-08-15T05:51:21.966694vps-d63064a2 sshd[45475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.50.17  user=root
2020-08-15T05:51:21.949969vps-d63064a2 sshd[45475]: User root from 119.45.50.17 not allowed because not listed in AllowUsers
2020-08-15T05:51:23.511882vps-d63064a2 sshd[45475]: Failed password for invalid user root from 119.45.50.17 port 32810 ssh2
...
2020-08-15 14:38:59
120.131.3.191 attackbotsspam
2020-08-15T05:45:14.260680vps773228.ovh.net sshd[29256]: Failed password for root from 120.131.3.191 port 45598 ssh2
2020-08-15T05:50:44.804364vps773228.ovh.net sshd[29322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.131.3.191  user=root
2020-08-15T05:50:47.172407vps773228.ovh.net sshd[29322]: Failed password for root from 120.131.3.191 port 47668 ssh2
2020-08-15T05:56:04.010887vps773228.ovh.net sshd[29367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.131.3.191  user=root
2020-08-15T05:56:06.308539vps773228.ovh.net sshd[29367]: Failed password for root from 120.131.3.191 port 49740 ssh2
...
2020-08-15 14:18:37
193.169.253.27 attack
Aug 15 08:13:15 srv01 postfix/smtpd\[29611\]: warning: unknown\[193.169.253.27\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 15 08:16:03 srv01 postfix/smtpd\[29358\]: warning: unknown\[193.169.253.27\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 15 08:19:15 srv01 postfix/smtpd\[4056\]: warning: unknown\[193.169.253.27\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 15 08:20:02 srv01 postfix/smtpd\[4056\]: warning: unknown\[193.169.253.27\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 15 08:20:35 srv01 postfix/smtpd\[4949\]: warning: unknown\[193.169.253.27\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-15 14:23:56
106.12.69.68 attackspambots
firewall-block, port(s): 24996/tcp
2020-08-15 14:19:08
222.186.180.6 attack
Automatic report BANNED IP
2020-08-15 14:38:29
83.143.148.197 attack
Automatic report - Banned IP Access
2020-08-15 14:41:09
185.117.215.9 attackspam
Invalid user admin from 185.117.215.9 port 43024
2020-08-15 14:19:25
222.186.173.183 attack
2020-08-15T09:12:49.880836afi-git.jinr.ru sshd[14511]: Failed password for root from 222.186.173.183 port 27068 ssh2
2020-08-15T09:12:53.090996afi-git.jinr.ru sshd[14511]: Failed password for root from 222.186.173.183 port 27068 ssh2
2020-08-15T09:12:56.376311afi-git.jinr.ru sshd[14511]: Failed password for root from 222.186.173.183 port 27068 ssh2
2020-08-15T09:12:56.376430afi-git.jinr.ru sshd[14511]: error: maximum authentication attempts exceeded for root from 222.186.173.183 port 27068 ssh2 [preauth]
2020-08-15T09:12:56.376444afi-git.jinr.ru sshd[14511]: Disconnecting: Too many authentication failures [preauth]
...
2020-08-15 14:15:59
130.93.84.1 attack
Aug 15 08:04:39 mout sshd[32244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.93.84.1  user=pi
Aug 15 08:04:41 mout sshd[32244]: Failed password for pi from 130.93.84.1 port 49840 ssh2
Aug 15 08:04:42 mout sshd[32244]: Connection closed by authenticating user pi 130.93.84.1 port 49840 [preauth]
2020-08-15 14:09:45
202.59.166.146 attackbots
Aug 15 05:56:09 ajax sshd[28038]: Failed password for root from 202.59.166.146 port 58093 ssh2
2020-08-15 13:59:19
129.211.146.50 attack
frenzy
2020-08-15 14:41:26
36.72.249.181 attack
Icarus honeypot on github
2020-08-15 14:13:00
51.15.106.64 attackbots
Automatic report - Port Scan
2020-08-15 14:31:33
223.113.74.54 attack
2020-08-15T05:10:12.689182shield sshd\[15277\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.113.74.54  user=root
2020-08-15T05:10:14.951477shield sshd\[15277\]: Failed password for root from 223.113.74.54 port 52844 ssh2
2020-08-15T05:11:29.569045shield sshd\[15372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.113.74.54  user=root
2020-08-15T05:11:31.068560shield sshd\[15372\]: Failed password for root from 223.113.74.54 port 48482 ssh2
2020-08-15T05:12:51.114405shield sshd\[15511\]: Invalid user cn from 223.113.74.54 port 45652
2020-08-15 14:39:47

Recently Reported IPs

12.101.220.240 135.46.99.217 224.97.156.70 128.115.47.175
42.129.160.75 107.236.185.203 28.231.118.237 218.186.69.189
227.163.89.125 227.97.231.200 36.114.115.102 254.189.46.65
35.248.34.230 57.4.175.113 7.182.40.163 238.18.36.221
143.249.246.249 57.180.252.239 142.228.144.216 62.189.31.10