Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Santa Barbara

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 207.154.72.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9424
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;207.154.72.219.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 14:57:37 CST 2025
;; MSG SIZE  rcvd: 107
Host info
219.72.154.207.in-addr.arpa domain name pointer sb0-cf9a48db.dsl.impulse.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
219.72.154.207.in-addr.arpa	name = sb0-cf9a48db.dsl.impulse.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
139.199.80.67 attack
Fail2Ban
2020-08-09 16:04:24
142.4.214.223 attackbots
2020-08-09T03:33:13.7709661495-001 sshd[13474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns537793.ip-142-4-214.net  user=root
2020-08-09T03:33:16.1008921495-001 sshd[13474]: Failed password for root from 142.4.214.223 port 49012 ssh2
2020-08-09T03:37:10.2964971495-001 sshd[4620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns537793.ip-142-4-214.net  user=root
2020-08-09T03:37:12.1997971495-001 sshd[4620]: Failed password for root from 142.4.214.223 port 32812 ssh2
2020-08-09T03:41:07.5420271495-001 sshd[8267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns537793.ip-142-4-214.net  user=root
2020-08-09T03:41:09.2744751495-001 sshd[8267]: Failed password for root from 142.4.214.223 port 44846 ssh2
...
2020-08-09 16:19:59
106.53.70.152 attackspambots
Aug  9 10:48:14 hosting sshd[24886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.70.152  user=root
Aug  9 10:48:16 hosting sshd[24886]: Failed password for root from 106.53.70.152 port 38128 ssh2
...
2020-08-09 15:59:22
188.251.142.85 attackbots
Aug  9 09:00:53 cdc sshd[16088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.251.142.85  user=pi
Aug  9 09:00:55 cdc sshd[16088]: Failed password for invalid user pi from 188.251.142.85 port 48996 ssh2
2020-08-09 16:38:59
67.54.159.145 attack
Scanning
2020-08-09 16:22:17
49.232.144.7 attackspam
$f2bV_matches
2020-08-09 16:00:44
200.110.168.58 attackspambots
Aug  9 02:49:29 Tower sshd[40523]: Connection from 200.110.168.58 port 49831 on 192.168.10.220 port 22 rdomain ""
Aug  9 02:49:32 Tower sshd[40523]: Failed password for root from 200.110.168.58 port 49831 ssh2
Aug  9 02:49:33 Tower sshd[40523]: Received disconnect from 200.110.168.58 port 49831:11: Bye Bye [preauth]
Aug  9 02:49:33 Tower sshd[40523]: Disconnected from authenticating user root 200.110.168.58 port 49831 [preauth]
2020-08-09 16:29:09
80.82.77.212 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 76 - port: 49152 proto: udp cat: Misc Attackbytes: 180
2020-08-09 16:02:07
51.77.200.4 attackspambots
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-09T07:25:05Z and 2020-08-09T07:39:30Z
2020-08-09 16:06:53
14.161.3.166 attackspambots
1596945079 - 08/09/2020 05:51:19 Host: 14.161.3.166/14.161.3.166 Port: 445 TCP Blocked
...
2020-08-09 16:05:15
49.233.148.2 attack
SSH Brute Force
2020-08-09 16:10:41
154.85.38.237 attack
Aug  9 08:43:16 rocket sshd[18470]: Failed password for root from 154.85.38.237 port 52538 ssh2
Aug  9 08:47:41 rocket sshd[19094]: Failed password for root from 154.85.38.237 port 35538 ssh2
...
2020-08-09 16:03:57
14.169.103.56 attack
Automatic report - Port Scan Attack
2020-08-09 16:03:12
45.88.110.138 attackspam
Automatic report - Banned IP Access
2020-08-09 16:07:24
93.153.173.99 attackspambots
2020-08-09T08:10:54.163041+02:00  sshd[16023]: Failed password for root from 93.153.173.99 port 59186 ssh2
2020-08-09 16:02:38

Recently Reported IPs

171.67.178.83 255.74.230.176 251.189.4.240 131.111.31.2
250.213.188.237 177.117.11.75 135.203.41.252 85.166.159.113
174.129.136.178 184.174.142.120 255.28.140.166 168.207.127.175
28.121.222.8 134.89.123.205 42.57.191.86 15.122.58.198
53.120.41.17 141.103.254.52 144.190.237.166 92.40.44.79