Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.138.189.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64370
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;54.138.189.168.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 00:54:21 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 168.189.138.54.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 168.189.138.54.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
170.79.114.49 attackbots
Seq 2995002506
2019-12-07 03:23:09
218.92.0.139 attack
Dec  6 20:42:12 minden010 sshd[29181]: Failed password for root from 218.92.0.139 port 59229 ssh2
Dec  6 20:42:22 minden010 sshd[29181]: Failed password for root from 218.92.0.139 port 59229 ssh2
Dec  6 20:42:25 minden010 sshd[29181]: Failed password for root from 218.92.0.139 port 59229 ssh2
Dec  6 20:42:25 minden010 sshd[29181]: error: maximum authentication attempts exceeded for root from 218.92.0.139 port 59229 ssh2 [preauth]
...
2019-12-07 03:56:39
112.163.30.130 attack
Seq 2995002506
2019-12-07 03:29:39
39.107.69.90 attackbotsspam
Seq 2995002506
2019-12-07 03:39:37
112.82.30.150 attackbots
Seq 2995002506
2019-12-07 03:46:49
129.28.187.178 attack
Dec  6 14:19:57 linuxvps sshd\[9701\]: Invalid user plod from 129.28.187.178
Dec  6 14:19:57 linuxvps sshd\[9701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.187.178
Dec  6 14:19:59 linuxvps sshd\[9701\]: Failed password for invalid user plod from 129.28.187.178 port 39352 ssh2
Dec  6 14:27:42 linuxvps sshd\[13976\]: Invalid user home from 129.28.187.178
Dec  6 14:27:42 linuxvps sshd\[13976\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.187.178
2019-12-07 03:49:20
106.13.93.199 attackspambots
Dec  6 08:55:17 hpm sshd\[18598\]: Invalid user sabine from 106.13.93.199
Dec  6 08:55:17 hpm sshd\[18598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.93.199
Dec  6 08:55:19 hpm sshd\[18598\]: Failed password for invalid user sabine from 106.13.93.199 port 40196 ssh2
Dec  6 09:01:26 hpm sshd\[19148\]: Invalid user sandalen from 106.13.93.199
Dec  6 09:01:26 hpm sshd\[19148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.93.199
2019-12-07 03:49:34
117.28.158.159 attackspambots
Seq 2995002506
2019-12-07 03:27:28
177.33.41.137 attack
Automatic report - Banned IP Access
2019-12-07 03:20:25
99.47.42.187 attackbots
Seq 2995002506
2019-12-07 03:31:51
118.103.212.3 attack
" "
2019-12-07 03:26:56
123.108.155.124 attackbots
Seq 2995002506
2019-12-07 03:25:30
112.24.103.30 attackspambots
Seq 2995002506
2019-12-07 03:30:11
60.212.66.222 attackbots
Seq 2995002506
2019-12-07 03:36:52
109.207.126.142 attack
Seq 2995002506
2019-12-07 03:30:30

Recently Reported IPs

189.124.218.83 218.62.207.245 75.185.106.112 243.30.7.230
189.83.61.40 167.153.126.222 182.23.84.218 197.37.224.232
149.88.22.37 236.49.248.251 192.247.227.69 157.50.34.14
173.213.89.77 247.212.177.210 95.178.36.57 155.110.232.89
108.144.147.197 39.227.212.86 59.47.193.156 117.161.142.12