Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.158.54.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37366
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.158.54.107.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020900 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 00:25:36 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 107.54.158.2.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 107.54.158.2.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
171.103.150.158 attackspam
proto=tcp  .  spt=35255  .  dpt=993  .  src=171.103.150.158  .  dst=xx.xx.4.1  .     Found on   Blocklist de       (268)
2020-04-28 21:38:53
101.89.147.85 attackbotsspam
" "
2020-04-28 21:27:08
189.124.93.223 attack
Port probing on unauthorized port 445
2020-04-28 21:44:59
5.34.131.72 attack
Apr 28 14:30:18 nextcloud sshd\[7733\]: Invalid user student10 from 5.34.131.72
Apr 28 14:30:18 nextcloud sshd\[7733\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.34.131.72
Apr 28 14:30:20 nextcloud sshd\[7733\]: Failed password for invalid user student10 from 5.34.131.72 port 60956 ssh2
2020-04-28 20:58:05
162.243.42.225 attack
2020-04-28T15:18:29.189714sd-86998 sshd[36804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.42.225  user=root
2020-04-28T15:18:31.297598sd-86998 sshd[36804]: Failed password for root from 162.243.42.225 port 60980 ssh2
2020-04-28T15:23:41.900687sd-86998 sshd[37250]: Invalid user geoffrey from 162.243.42.225 port 43682
2020-04-28T15:23:41.906146sd-86998 sshd[37250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.42.225
2020-04-28T15:23:41.900687sd-86998 sshd[37250]: Invalid user geoffrey from 162.243.42.225 port 43682
2020-04-28T15:23:43.512131sd-86998 sshd[37250]: Failed password for invalid user geoffrey from 162.243.42.225 port 43682 ssh2
...
2020-04-28 21:34:54
136.255.144.2 attack
Automatic report BANNED IP
2020-04-28 20:57:04
61.152.70.126 attackspam
2020-04-28T09:07:11.4071361495-001 sshd[10070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.152.70.126  user=root
2020-04-28T09:07:13.7708951495-001 sshd[10070]: Failed password for root from 61.152.70.126 port 51068 ssh2
2020-04-28T09:10:27.8165761495-001 sshd[10306]: Invalid user beamer from 61.152.70.126 port 4831
2020-04-28T09:10:27.8240591495-001 sshd[10306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.152.70.126
2020-04-28T09:10:27.8165761495-001 sshd[10306]: Invalid user beamer from 61.152.70.126 port 4831
2020-04-28T09:10:29.7616801495-001 sshd[10306]: Failed password for invalid user beamer from 61.152.70.126 port 4831 ssh2
...
2020-04-28 21:34:19
185.18.6.65 attackbotsspam
2020-04-28T09:03:01.6642751495-001 sshd[9779]: Failed password for invalid user zcx from 185.18.6.65 port 47000 ssh2
2020-04-28T09:07:20.9139981495-001 sshd[10121]: Invalid user arif from 185.18.6.65 port 33274
2020-04-28T09:07:20.9186031495-001 sshd[10121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.18.6.65
2020-04-28T09:07:20.9139981495-001 sshd[10121]: Invalid user arif from 185.18.6.65 port 33274
2020-04-28T09:07:23.5182191495-001 sshd[10121]: Failed password for invalid user arif from 185.18.6.65 port 33274 ssh2
2020-04-28T09:11:39.3354741495-001 sshd[10395]: Invalid user dev from 185.18.6.65 port 47768
...
2020-04-28 21:31:24
112.133.245.65 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-04-28 21:39:23
202.189.181.210 attack
202.189.181.210 From:	Mail Portal 
Sent on:	Thursday, April 23, 2020 3:51:04 PM
To:	x 
Subject:	3 undelivered mail

Office365 spearphishing attempt
2020-04-28 21:25:45
51.38.126.92 attackbots
Apr 28 15:23:54 [host] sshd[10712]: Invalid user t
Apr 28 15:23:54 [host] sshd[10712]: pam_unix(sshd:
Apr 28 15:23:56 [host] sshd[10712]: Failed passwor
2020-04-28 21:36:37
46.101.183.105 attackspambots
Automatic report BANNED IP
2020-04-28 21:53:48
222.186.175.217 attack
DATE:2020-04-28 15:20:22, IP:222.186.175.217, PORT:ssh SSH brute force auth on honeypot server (epe-honey1-hq)
2020-04-28 21:21:15
139.59.169.103 attack
Apr 28 15:46:20 PorscheCustomer sshd[16154]: Failed password for root from 139.59.169.103 port 49358 ssh2
Apr 28 15:49:01 PorscheCustomer sshd[16299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.169.103
Apr 28 15:49:03 PorscheCustomer sshd[16299]: Failed password for invalid user tibero2 from 139.59.169.103 port 39948 ssh2
...
2020-04-28 21:55:10
141.98.9.161 attack
Apr 28 08:56:18 www sshd\[20746\]: Invalid user admin from 141.98.9.161
Apr 28 08:56:31 www sshd\[20767\]: Invalid user ubnt from 141.98.9.161
...
2020-04-28 21:18:10

Recently Reported IPs

220.1.208.228 228.209.235.65 14.118.242.189 251.82.222.153
163.48.105.41 42.148.191.233 159.178.246.53 91.187.219.220
204.224.119.137 66.144.249.198 79.140.72.240 23.153.203.56
208.87.207.186 249.36.130.108 40.84.182.93 34.102.175.25
192.157.162.173 35.128.235.205 144.208.102.150 226.44.234.82