Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.54.137.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25386
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;220.54.137.132.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012802 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 07:08:20 CST 2025
;; MSG SIZE  rcvd: 107
Host info
132.137.54.220.in-addr.arpa domain name pointer softbank220054137132.bbtec.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
132.137.54.220.in-addr.arpa	name = softbank220054137132.bbtec.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.145.66.40 attackspam
 TCP (SYN) 45.145.66.40:52283 -> port 31040, len 44
2020-07-06 23:39:09
45.145.66.91 attack
 TCP (SYN) 45.145.66.91:59949 -> port 22202, len 44
2020-07-06 23:38:26
185.200.118.70 attackspambots
Port scan: Attack repeated for 24 hours
2020-07-06 23:44:57
206.189.128.215 attackbots
Jul  6 14:44:53 vm0 sshd[24465]: Failed password for root from 206.189.128.215 port 54542 ssh2
...
2020-07-07 00:01:44
222.186.61.19 attack
 TCP (SYN) 222.186.61.19:37181 -> port 443, len 44
2020-07-06 23:43:46
185.176.27.14 attackspambots
SmallBizIT.US 6 packets to tcp(35283,35284,35295,35296,35297,35386)
2020-07-07 00:06:41
195.54.160.135 attackbots
Web application attack detected by fail2ban
2020-07-07 00:03:52
185.39.11.105 attackspam
Unauthorized connection attempt detected from IP address 185.39.11.105 to port 80
2020-07-06 23:47:07
185.39.11.38 attackspam
 TCP (SYN) 185.39.11.38:53013 -> port 25741, len 44
2020-07-06 23:49:06
2.189.189.130 attackspam
 TCP (SYN) 2.189.189.130:48108 -> port 29869, len 44
2020-07-06 23:42:52
45.148.121.43 attack
probes 3 times on the port 11211
2020-07-06 23:36:45
125.64.94.130 attackspam
" "
2020-07-06 23:54:46
94.102.51.58 attackspam
07/06/2020-11:44:46.894621 94.102.51.58 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-07-06 23:56:49
94.102.49.190 attack
 TCP (SYN) 94.102.49.190:18438 -> port 1023, len 44
2020-07-06 23:58:35
45.145.66.115 attackspambots
scans 5 times in preceeding hours on the ports (in chronological order) 3999 34200 3401 8002 6001
2020-07-06 23:37:06

Recently Reported IPs

147.219.195.229 174.78.101.107 255.216.89.201 242.196.252.236
253.193.188.160 158.107.9.57 66.169.82.71 241.89.117.61
60.207.65.4 20.97.136.143 188.31.38.16 124.134.81.221
107.141.138.111 166.253.96.56 187.57.156.133 127.62.121.81
107.1.203.251 166.92.250.161 138.150.162.175 141.40.97.148