Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.106.139.186
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64912
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;54.106.139.186.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 01:51:41 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 186.139.106.54.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 186.139.106.54.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.38.179.143 attackbots
$f2bV_matches
2019-12-08 17:54:45
32.220.54.46 attack
Dec  8 11:28:02 gw1 sshd[12874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=32.220.54.46
Dec  8 11:28:04 gw1 sshd[12874]: Failed password for invalid user roque from 32.220.54.46 port 7112 ssh2
...
2019-12-08 17:45:24
132.232.59.247 attackspam
Dec  8 09:29:01 zeus sshd[4501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.59.247 
Dec  8 09:29:03 zeus sshd[4501]: Failed password for invalid user odoux from 132.232.59.247 port 44152 ssh2
Dec  8 09:36:15 zeus sshd[4702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.59.247 
Dec  8 09:36:17 zeus sshd[4702]: Failed password for invalid user smmsp from 132.232.59.247 port 52808 ssh2
2019-12-08 18:11:01
118.24.99.161 attackbotsspam
Dec  8 10:18:30 sso sshd[32506]: Failed password for root from 118.24.99.161 port 33138 ssh2
...
2019-12-08 18:12:58
122.117.25.192 attackspambots
Dec  8 11:03:45 lnxweb61 sshd[21051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.25.192
Dec  8 11:03:45 lnxweb61 sshd[21051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.25.192
2019-12-08 18:05:08
137.83.79.163 attackspam
Dec  8 10:34:53 ArkNodeAT sshd\[1266\]: Invalid user bizhan from 137.83.79.163
Dec  8 10:34:53 ArkNodeAT sshd\[1266\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.83.79.163
Dec  8 10:34:55 ArkNodeAT sshd\[1266\]: Failed password for invalid user bizhan from 137.83.79.163 port 17488 ssh2
2019-12-08 17:42:47
58.216.236.238 attack
12/08/2019-01:28:01.410947 58.216.236.238 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-12-08 17:50:40
182.61.31.79 attack
Dec  8 12:13:40 server sshd\[28750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.31.79  user=root
Dec  8 12:13:41 server sshd\[28750\]: Failed password for root from 182.61.31.79 port 54038 ssh2
Dec  8 12:24:53 server sshd\[32265\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.31.79  user=root
Dec  8 12:24:55 server sshd\[32265\]: Failed password for root from 182.61.31.79 port 45002 ssh2
Dec  8 12:41:32 server sshd\[5102\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.31.79  user=root
...
2019-12-08 18:07:09
157.230.235.233 attack
Dec  8 10:15:20 [host] sshd[13040]: Invalid user sendit from 157.230.235.233
Dec  8 10:15:20 [host] sshd[13040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.235.233
Dec  8 10:15:22 [host] sshd[13040]: Failed password for invalid user sendit from 157.230.235.233 port 59140 ssh2
2019-12-08 17:52:37
193.106.31.130 attackspam
[Sun Dec 08 13:27:55.687057 2019] [:error] [pid 3145:tid 140218334148352] [client 193.106.31.130:63701] [client 193.106.31.130] ModSecurity: Access denied with code 403 (phase 1). Match of "within %{tx.allowed_http_versions}" against "REQUEST_PROTOCOL" required. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "972"] [id "920430"] [msg "HTTP protocol version is not allowed by policy"] [data "HTTP/1.0"] [severity "CRITICAL"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/POLICY/PROTOCOL_NOT_ALLOWED"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A6"] [tag "PCI/6.5.10"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/administrator/index.php"] [unique_id "XeyX63kf9NG@cobJeqWM8gAAAAg"]
...
2019-12-08 17:55:36
217.182.70.125 attackspambots
SSH brutforce
2019-12-08 17:38:25
196.1.203.98 attackspambots
firewall-block, port(s): 23/tcp
2019-12-08 18:06:39
222.186.175.154 attackbots
Dec  8 11:10:13 dedicated sshd[28262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154  user=root
Dec  8 11:10:15 dedicated sshd[28262]: Failed password for root from 222.186.175.154 port 35216 ssh2
2019-12-08 18:11:34
27.74.62.160 attackspambots
Portscan detected
2019-12-08 17:47:36
49.88.112.117 attack
Dec  8 04:46:51 ny01 sshd[8548]: Failed password for root from 49.88.112.117 port 31434 ssh2
Dec  8 04:46:53 ny01 sshd[8548]: Failed password for root from 49.88.112.117 port 31434 ssh2
Dec  8 04:46:55 ny01 sshd[8548]: Failed password for root from 49.88.112.117 port 31434 ssh2
2019-12-08 17:55:11

Recently Reported IPs

166.89.121.209 77.162.13.110 250.218.238.207 227.252.159.75
120.203.10.21 88.211.164.69 133.52.154.182 148.154.83.149
77.6.87.211 62.133.170.151 208.28.41.122 83.57.25.210
73.198.246.138 154.79.253.9 195.249.165.90 109.38.239.72
34.202.240.159 46.166.240.31 117.39.162.254 240.58.55.15