Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Pakistan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 154.81.245.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23810
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;154.81.245.131.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022400 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 20:00:46 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 131.245.81.154.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 131.245.81.154.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
81.12.52.130 attackspam
port scan and connect, tcp 1433 (ms-sql-s)
2020-09-21 06:02:19
113.22.10.195 attackbotsspam
Unauthorized connection attempt from IP address 113.22.10.195 on Port 445(SMB)
2020-09-21 06:19:36
88.117.212.178 attack
Automatic report - Port Scan Attack
2020-09-21 06:03:44
106.12.212.100 attackspam
Sep 20 17:52:51 ny01 sshd[27741]: Failed password for root from 106.12.212.100 port 60694 ssh2
Sep 20 17:57:00 ny01 sshd[28567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.212.100
Sep 20 17:57:02 ny01 sshd[28567]: Failed password for invalid user ftp_user from 106.12.212.100 port 37674 ssh2
2020-09-21 06:09:11
125.124.117.226 attackspambots
Sep 20 18:16:50 jumpserver sshd[169825]: Failed password for root from 125.124.117.226 port 42947 ssh2
Sep 20 18:21:35 jumpserver sshd[169875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.117.226  user=root
Sep 20 18:21:37 jumpserver sshd[169875]: Failed password for root from 125.124.117.226 port 42889 ssh2
...
2020-09-21 06:04:49
45.129.33.154 attackbotsspam
Multiport scan : 214 ports scanned 202 303 606 707 909 1000 1001 1011 1101 1110 1112 1113 1116 1117 1118 1119 1144 1155 1166 1177 1189 1199 1200 1212 1234 1300 1389 1600 1700 1800 1900 2000 2020 2022 2100 2121 2202 2244 2255 2277 2288 2289 2299 2300 2323 2389 2400 2525 2700 2800 2900 3000 3030 3033 3300 3302 3305 3307 3308 3309 3310 3311 3312 3313 3321 3322 3323 3324 3325 3335 3336 3337 3338 3339 3342 3348 3349 3350 3351 3352 3353 .....
2020-09-21 06:57:39
212.129.246.52 attack
(sshd) Failed SSH login from 212.129.246.52 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 20 12:46:13 server5 sshd[945]: Invalid user userftp from 212.129.246.52
Sep 20 12:46:13 server5 sshd[945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.246.52 
Sep 20 12:46:16 server5 sshd[945]: Failed password for invalid user userftp from 212.129.246.52 port 42770 ssh2
Sep 20 13:01:39 server5 sshd[7832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.246.52  user=root
Sep 20 13:01:42 server5 sshd[7832]: Failed password for root from 212.129.246.52 port 43450 ssh2
2020-09-21 06:24:59
183.108.100.33 attackspam
Sep 20 20:01:59 root sshd[6784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.108.100.33  user=root
Sep 20 20:02:00 root sshd[6784]: Failed password for root from 183.108.100.33 port 12840 ssh2
...
2020-09-21 06:10:23
120.133.136.191 attackspam
Sep 20 23:53:01 marvibiene sshd[28052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.133.136.191 
Sep 20 23:53:02 marvibiene sshd[28052]: Failed password for invalid user ubuntu from 120.133.136.191 port 41442 ssh2
Sep 21 00:01:26 marvibiene sshd[28948]: Failed password for root from 120.133.136.191 port 32999 ssh2
2020-09-21 06:11:44
79.46.159.185 attack
Sep 20 18:01:53 blackbee postfix/smtpd[4198]: NOQUEUE: reject: RCPT from host-79-46-159-185.retail.telecomitalia.it[79.46.159.185]: 554 5.7.1 Service unavailable; Client host [79.46.159.185] blocked using zen.spamhaus.org; from= to= proto=ESMTP helo=
...
2020-09-21 06:15:21
183.83.145.27 attackbotsspam
Unauthorized connection attempt from IP address 183.83.145.27 on Port 445(SMB)
2020-09-21 06:17:53
42.2.131.7 attackbotsspam
Sep 20 14:01:26 logopedia-1vcpu-1gb-nyc1-01 sshd[443008]: Failed password for root from 42.2.131.7 port 35310 ssh2
...
2020-09-21 06:53:17
157.245.100.5 attack
Invalid user testing from 157.245.100.5 port 48082
2020-09-21 06:21:00
81.69.171.202 attack
Sep 20 16:58:04 gitlab sshd[206899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.69.171.202 
Sep 20 16:58:04 gitlab sshd[206899]: Invalid user odoo from 81.69.171.202 port 40500
Sep 20 16:58:05 gitlab sshd[206899]: Failed password for invalid user odoo from 81.69.171.202 port 40500 ssh2
Sep 20 17:02:02 gitlab sshd[207210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.69.171.202  user=root
Sep 20 17:02:04 gitlab sshd[207210]: Failed password for root from 81.69.171.202 port 57772 ssh2
...
2020-09-21 06:05:37
187.189.108.139 attack
Unauthorized connection attempt from IP address 187.189.108.139 on Port 445(SMB)
2020-09-21 06:06:59

Recently Reported IPs

127.214.211.10 82.218.202.203 26.47.212.193 25.146.190.224
20.42.59.132 203.233.99.147 41.17.100.117 98.26.153.17
159.202.83.131 139.218.231.242 227.161.25.95 164.251.254.133
55.153.104.204 80.122.184.117 201.142.142.248 205.244.223.64
116.161.137.243 186.171.11.211 206.11.41.68 109.114.78.123