Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: New York City

Region: New York

Country: United States

Internet Service Provider: Softcom Internet Communications, Inc

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 156.229.21.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31731
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;156.229.21.54.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025071802 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 19 05:30:12 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 54.21.229.156.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.21.229.156.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
201.247.151.51 attack
*Port Scan* detected from 201.247.151.51 (SV/El Salvador/-). 4 hits in the last 0 seconds
2019-08-14 02:19:42
106.13.120.46 attack
Aug 13 07:10:17 raspberrypi sshd\[21092\]: Invalid user postgres from 106.13.120.46Aug 13 07:10:20 raspberrypi sshd\[21092\]: Failed password for invalid user postgres from 106.13.120.46 port 32918 ssh2Aug 13 07:25:40 raspberrypi sshd\[21668\]: Invalid user jaxon from 106.13.120.46Aug 13 07:25:42 raspberrypi sshd\[21668\]: Failed password for invalid user jaxon from 106.13.120.46 port 54034 ssh2
...
2019-08-14 01:59:32
218.150.220.194 attackspam
Invalid user scott from 218.150.220.194 port 55050
2019-08-14 01:42:21
106.13.4.150 attackbots
Aug 13 13:14:40 mail sshd\[10869\]: Failed password for invalid user tweety from 106.13.4.150 port 29530 ssh2
Aug 13 13:31:38 mail sshd\[11359\]: Invalid user harold from 106.13.4.150 port 24722
Aug 13 13:31:38 mail sshd\[11359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.4.150
...
2019-08-14 01:34:15
123.195.226.44 attackbotsspam
1565681128 - 08/13/2019 14:25:28 Host: 123-195-226-44.dynamic.kbronet.com.tw/123.195.226.44 Port: 23 TCP Blocked
...
2019-08-14 02:11:27
50.208.56.156 attack
Aug 13 14:35:34 XXX sshd[52559]: Invalid user redis from 50.208.56.156 port 52262
2019-08-14 01:56:18
96.57.82.166 attack
Aug 13 16:48:10 XXXXXX sshd[23762]: Invalid user scaner from 96.57.82.166 port 50740
2019-08-14 01:50:30
77.247.181.162 attackspambots
Aug 13 19:46:08 mail sshd\[4976\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.247.181.162  user=root
Aug 13 19:46:10 mail sshd\[4976\]: Failed password for root from 77.247.181.162 port 53634 ssh2
Aug 13 19:46:12 mail sshd\[4976\]: Failed password for root from 77.247.181.162 port 53634 ssh2
Aug 13 19:46:14 mail sshd\[4976\]: Failed password for root from 77.247.181.162 port 53634 ssh2
Aug 13 19:46:17 mail sshd\[4976\]: Failed password for root from 77.247.181.162 port 53634 ssh2
2019-08-14 01:56:38
176.248.138.240 attackbots
Automatic report - Port Scan Attack
2019-08-14 01:57:12
180.97.80.55 attackspam
Aug 13 23:11:20 lcl-usvr-01 sshd[7894]: Invalid user divya from 180.97.80.55
Aug 13 23:11:20 lcl-usvr-01 sshd[7894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.97.80.55 
Aug 13 23:11:20 lcl-usvr-01 sshd[7894]: Invalid user divya from 180.97.80.55
Aug 13 23:11:22 lcl-usvr-01 sshd[7894]: Failed password for invalid user divya from 180.97.80.55 port 33282 ssh2
Aug 13 23:17:04 lcl-usvr-01 sshd[9272]: Invalid user jboss from 180.97.80.55
2019-08-14 02:24:19
179.233.31.10 attack
Aug 13 14:50:59 XXX sshd[53995]: Invalid user demuji from 179.233.31.10 port 22444
2019-08-14 02:27:22
142.93.198.152 attackbots
Aug 13 14:45:00 XXX sshd[53289]: Invalid user eliane from 142.93.198.152 port 44144
2019-08-14 01:52:32
192.99.92.111 attackbots
$f2bV_matches
2019-08-14 01:48:04
201.248.90.19 attackspam
SSH Brute-Force attacks
2019-08-14 02:08:13
106.13.44.83 attack
Unauthorized SSH login attempts
2019-08-14 02:25:51

Recently Reported IPs

110.213.249.91 176.65.148.231 159.223.229.40 43.157.98.187
216.118.251.242 20.163.27.102 135.164.135.76 14.154.27.59
6.115.219.228 135.186.103.22 43.130.131.18 185.38.150.7
101.21.78.141 171.228.171.139 14.155.188.209 57.141.2.27
120.10.118.44 111.208.78.17 128.199.144.5 159.65.219.252