Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 180.196.109.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5168
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;180.196.109.138.		IN	A

;; AUTHORITY SECTION:
.			453	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 23:04:41 CST 2022
;; MSG SIZE  rcvd: 108
Host info
138.109.196.180.in-addr.arpa domain name pointer 180-196-109-138.area51a.commufa.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.109.196.180.in-addr.arpa	name = 180-196-109-138.area51a.commufa.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
121.138.174.176 attack
May 6 17:49:14 mail sshd\\[17774\\]: Invalid user admin from 121.138.174.176\\
May 6 17:49:15 mail sshd\\[17774\\]: Failed password for invalid user admin from 121.138.174.176 port 47833 ssh2\\
May 6 17:49:17 mail sshd\\[17774\\]: Failed password for invalid user admin from 121.138.174.176 port 47833 ssh2\\
May 6 17:49:19 mail sshd\\[17774\\]: Failed password for invalid user admin from 121.138.174.176 port 47833 ssh2\\
May 6 17:49:21 mail sshd\\[17774\\]: Failed password for invalid user admin from 121.138.174.176 port 47833 ssh2\\
May 6 17:49:23 mail sshd\\[17774\\]: Failed password for invalid user admin from 121.138.174.176 port 47833 ssh2\\
2019-05-25 07:34:15
182.254.197.152 attack
182.254.197.152 - - [14/May/2019:06:42:16 +0800] "POST /%75%73%65%72/%72%65%67%69%73%74%65%72?%65%6c%65%6d%65%6e%74%5f%70%61%72%65%6e%74%73=%74%69%6d%65%7a%6f%6e%65%2f%74%69%6d%65%7a%6f%6e%65%2f%23%76%61%6c%75%65&%61%6a%61%78%5f%66%6f%72%6d=1&%5f%77%72%61%70%70%65%72%5f%66%6f%72%6d%61%74=%64%72%75%70%61%6c%5f%61%6http://118.25.52.138/ HTTP/1.1" 301 194 "-" "Mozilla/5.0 (W
2019-05-14 07:15:21
104.152.52.67 attack
104.152.52.67 - - [15/May/2019:13:48:53 +0800] "OPTIONS sip:nm SIP/2.0" 400 182 "-" "-"
104.152.52.67 - - [15/May/2019:13:48:53 +0800] "OPTIONS / HTTP/1.0" 200 0 "-" "-"
104.152.52.67 - - [15/May/2019:13:48:53 +0800] "TNMP\\x04\\x00\\x00\\x00TNME\\x00\\x00\\x04\\x00" 400 182 "-" "-"
104.152.52.67 - - [15/May/2019:13:48:54 +0800] "\\x03\\x00\\x00\\x0B\\x06\\xE0\\x00\\x00\\x00\\x00\\x00" 400 182 "-" "-"
104.152.52.67 - - [15/May/2019:13:48:54 +0800] "DmdT\\x00\\x00\\x00\\x17\\x00\\x00\\x00\\x01\\x00\\x00\\x00\\x00\\x11\\x11\\x00\\xFF\\x01\\xFF\\x13" 400 182 "-" "-"
2019-05-15 13:55:51
194.61.24.227 attack
/admin attack on Magento installation
2019-06-03 00:54:04
141.8.142.176 bots
看样子是yandex搜索引擎的可用性爬虫
141.8.142.176 - - [17/May/2019:17:29:40 +0800] "GET /check-ip/2804:14d:5a83:449f:5ab:f26:15e4:e7ce HTTP/1.1" 200 7939 "-" "Mozilla/5.0 (compatible; YandexAccessibilityBot/3.0; +http://yandex.com/bots)"
2019-05-17 17:33:15
103.131.71.149 bots
越南的CocCoc搜索引擎,如果不想在越南发展商务,可以禁用
103.131.71.149 - - [14/May/2019:11:31:44 +0800] "GET /robots.txt HTTP/1.1" 301 194 "-" "Mozilla/5.0 (compatible; coccocbot-web/1.0; +http://help.coccoc.com/searchengine)"
103.131.71.149 - - [14/May/2019:11:31:45 +0800] "GET /robots.txt HTTP/1.1" 200 634 "-" "Mozilla/5.0 (compatible; coccocbot-web/1.0; +http://help.coccoc.com/searchengine)"
103.131.71.156 - - [14/May/2019:11:31:48 +0800] "GET /check-ip/27.72.74.143 HTTP/1.1" 200 9435 "-" "Mozilla/5.0 (compatible; coccocbot-web/1.0; +http://help.coccoc.com/searchengine)"
2019-05-14 11:34:43
54.36.33.20 botsattack
54.36.33.20 - - [27/May/2019:09:09:30 +0800] "GET /?q=node/add HTTP/1.1" 200 3321 "https://ipinfo.asytech.cn/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.170 Safari/537.36"
54.36.33.20 - - [27/May/2019:09:09:31 +0800] "GET /?q=user HTTP/1.1" 200 3320 "https://ipinfo.asytech.cn/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.170 Safari/537.36"
54.36.33.20 - - [27/May/2019:09:09:31 +0800] "GET /check-ip/103.118.112.110 HTTP/1.1" 200 9969 "https://ipinfo.asytech.cn/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.170 Safari/537.36"
54.36.33.20 - - [27/May/2019:09:09:32 +0800] "GET /?q=user/register HTTP/1.1" 200 3324 "https://ipinfo.asytech.cn/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.170 Safari/537.36"
54.36.33.20 - - [27/May/2019:09:09:32 +0800] "GET /check-ip/191.172.216.105 HTTP/1.1" 200 9968 "https://ipinfo.asytech.cn/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.170 Safari/537.36"
2019-05-27 09:25:46
104.152.52.68 bots
104.152.52.68 - - [07/May/2019:14:54:59 +0800] "\\x00\\x00\\x00\\xA4\\xFFSMBr\\x00\\x00\\x00\\x00\\x08\\x01@\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00@\\x06\\x00\\x00\\x01\\x00\\x00\\x81\\x00\\x02PC NETWORK PROGRAM 1.0\\x00\\x02MICROSOFT NETWORKS 1.03\\x00\\x02MICROSOFT NETWORKS 3.0\\x00\\x02LANMAN1.0\\x00\\x02LM1.2X002\\x00\\x02Samba\\x00\\x02NT LANMAN 1.0\\x00\\x02NT LM 0.12\\x00" 400 182 "-" "-"
104.152.52.68 - - [07/May/2019:14:54:59 +0800] "OPTIONS / RTSP/1.0" 400 182 "-" "-"
2019-05-07 14:57:08
46.105.98.178 normal
Ok
2019-06-12 07:18:11
43.231.216.104 attack
(imapd) Failed IMAP login from 43.231.216.104 (IN/India/-): 1 in the last 3600 secs
2019-05-25 07:29:12
213.180.203.19 bots
213.180.203.19 - - [14/May/2019:06:21:24 +0800] "GET /robots.txt HTTP/1.1" 200 634 "-" "Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)"
37.9.113.69 - - [14/May/2019:06:21:28 +0800] "GET /check-ip/94.247.177.124 HTTP/1.1" 200 9954 "-" "Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)"
87.250.224.100 - - [14/May/2019:06:21:32 +0800] "GET /check-ip/102.196.212.28/ HTTP/1.1" 200 10050 "-" "Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)"
141.8.142.176 - - [14/May/2019:06:21:36 +0800] "GET /check-ip/179.26.25.87/ HTTP/1.1" 200 10182 "-" "Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)"
2019-05-14 06:22:30
124.235.138.144 bots
124.235.138.144 - - [23/May/2019:12:41:36 +0800] "GET /favicon.ico HTTP/1.1" 200 4286 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Firefox/45.0"
101.249.227.246 - - [23/May/2019:12:41:36 +0800] "GET /favicon.ico HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Firefox/45.0"
101.249.227.246 - - [23/May/2019:12:41:37 +0800] "GET /favicon.ico HTTP/1.1" 200 4286 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Firefox/45.0"
101.249.227.246 - - [23/May/2019:12:41:38 +0800] "GET /home/favicon.ico HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko"
101.249.227.246 - - [23/May/2019:12:41:39 +0800] "GET /home/favicon.ico HTTP/1.1" 404 209 "-" "Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko"
124.235.138.144 - - [23/May/2019:12:41:42 +0800] "GET /home/favicon.ico HTTP/1.1" 404 209 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Firefox/45.0"
2019-05-23 13:08:18
54.93.245.75 spam
54.93.245.75 - - [15/May/2019:14:30:54 +0800] "GET /favicon.ico HTTP/1.1" 200 4286 "-" "Slack-ImgProxy (+https://api.slack.com/robots)"
2019-05-15 14:31:29
52.90.140.202 bots
52.90.140.202 - - [20/May/2019:13:04:24 +0800] "GET /check-ip/92.119.160.80 HTTP/1.1" 200 89336 "-" "Clickagy Intelligence Bot v2"
2019-05-20 13:05:16
3.92.45.174 bots
应该是adsense合作的一个广告商
3.92.45.174 - - [10/May/2019:08:19:00 +0800] "GET /ads.txt HTTP/1.1" 301 194 "-" "Jersey/2.25.1 (HttpUrlConnection 1.8.0_141)"
3.92.45.174 - - [10/May/2019:08:19:05 +0800] "GET /ads.txt HTTP/1.1" 404 232 "-" "Jersey/2.25.1 (HttpUrlConnection 1.8.0_141)"
2019-05-10 08:20:35

Recently Reported IPs

144.27.179.192 67.98.152.14 194.160.180.60 224.233.248.10
44.159.99.229 107.60.253.217 116.96.124.16 11.35.27.7
143.42.139.199 70.150.53.59 169.15.14.10 189.85.156.17
14.154.28.129 55.77.209.221 228.238.23.29 171.173.0.27
200.165.225.202 15.160.40.224 147.65.174.22 219.26.18.140