Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 69.154.90.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1759
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;69.154.90.13.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 05:09:58 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 13.90.154.69.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 13.90.154.69.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
91.121.110.50 attackbotsspam
Oct  9 09:03:26 microserver sshd[44932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.110.50  user=root
Oct  9 09:03:28 microserver sshd[44932]: Failed password for root from 91.121.110.50 port 48983 ssh2
Oct  9 09:07:25 microserver sshd[45529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.110.50  user=root
Oct  9 09:07:27 microserver sshd[45529]: Failed password for root from 91.121.110.50 port 40630 ssh2
Oct  9 09:11:33 microserver sshd[46132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.110.50  user=root
Oct  9 09:23:18 microserver sshd[47504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.110.50  user=root
Oct  9 09:23:21 microserver sshd[47504]: Failed password for root from 91.121.110.50 port 35444 ssh2
Oct  9 09:27:09 microserver sshd[48077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid
2019-10-09 16:12:30
104.236.124.45 attackspam
Oct  9 09:42:45 vps691689 sshd[23228]: Failed password for root from 104.236.124.45 port 33821 ssh2
Oct  9 09:50:44 vps691689 sshd[23376]: Failed password for root from 104.236.124.45 port 45803 ssh2
...
2019-10-09 16:14:13
163.172.217.172 attack
Jul 11 13:13:42 server sshd\[70886\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.217.172  user=root
Jul 11 13:13:44 server sshd\[70886\]: Failed password for root from 163.172.217.172 port 60582 ssh2
Jul 11 13:13:44 server sshd\[70893\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.217.172  user=root
Jul 11 13:13:44 server sshd\[70895\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.217.172  user=root
Jul 11 13:13:46 server sshd\[70893\]: Failed password for root from 163.172.217.172 port 34324 ssh2
Jul 11 13:13:46 server sshd\[70895\]: Failed password for root from 163.172.217.172 port 35706 ssh2
...
2019-10-09 15:43:58
162.243.94.34 attack
Jul  7 03:34:51 server sshd\[31990\]: Invalid user guest2 from 162.243.94.34
Jul  7 03:34:51 server sshd\[31990\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.94.34
Jul  7 03:34:53 server sshd\[31990\]: Failed password for invalid user guest2 from 162.243.94.34 port 40977 ssh2
...
2019-10-09 16:11:33
191.235.91.156 attackbotsspam
(sshd) Failed SSH login from 191.235.91.156 (BR/Brazil/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  9 05:31:32 server2 sshd[13985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.235.91.156  user=root
Oct  9 05:31:34 server2 sshd[13985]: Failed password for root from 191.235.91.156 port 34450 ssh2
Oct  9 05:44:33 server2 sshd[15472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.235.91.156  user=root
Oct  9 05:44:35 server2 sshd[15472]: Failed password for root from 191.235.91.156 port 42472 ssh2
Oct  9 05:54:11 server2 sshd[16556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.235.91.156  user=root
2019-10-09 16:06:49
163.172.157.162 attack
$f2bV_matches
2019-10-09 15:49:37
163.172.93.131 attack
SSH brute-force: detected 32 distinct usernames within a 24-hour window.
2019-10-09 15:40:06
175.141.238.155 attackspam
Automatic report - Port Scan Attack
2019-10-09 15:59:31
163.172.117.140 attackbotsspam
Jul 30 16:05:25 server sshd\[45744\]: Invalid user murat from 163.172.117.140
Jul 30 16:05:25 server sshd\[45744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.117.140
Jul 30 16:05:27 server sshd\[45744\]: Failed password for invalid user murat from 163.172.117.140 port 58980 ssh2
...
2019-10-09 15:50:32
175.207.13.200 attackbotsspam
Oct  9 06:16:38 vps647732 sshd[29722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.207.13.200
Oct  9 06:16:40 vps647732 sshd[29722]: Failed password for invalid user admin@001 from 175.207.13.200 port 34164 ssh2
...
2019-10-09 15:43:15
162.247.72.199 attackbots
Oct  9 09:06:28 rotator sshd\[10979\]: Address 162.247.72.199 maps to jaffer.tor-exit.calyxinstitute.org, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Oct  9 09:06:29 rotator sshd\[10979\]: Failed password for root from 162.247.72.199 port 59250 ssh2Oct  9 09:06:32 rotator sshd\[10979\]: Failed password for root from 162.247.72.199 port 59250 ssh2Oct  9 09:06:34 rotator sshd\[10979\]: Failed password for root from 162.247.72.199 port 59250 ssh2Oct  9 09:06:37 rotator sshd\[10979\]: Failed password for root from 162.247.72.199 port 59250 ssh2Oct  9 09:06:40 rotator sshd\[10979\]: Failed password for root from 162.247.72.199 port 59250 ssh2
...
2019-10-09 16:07:50
162.243.4.134 attack
Jul  2 10:28:14 server sshd\[173755\]: Invalid user jun from 162.243.4.134
Jul  2 10:28:14 server sshd\[173755\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.4.134
Jul  2 10:28:15 server sshd\[173755\]: Failed password for invalid user jun from 162.243.4.134 port 46660 ssh2
...
2019-10-09 16:13:42
162.247.74.74 attackbotsspam
2019-10-09T05:19:00.841325abusebot.cloudsearch.cf sshd\[11958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=wiebe.tor-exit.calyxinstitute.org  user=root
2019-10-09 16:00:59
162.243.158.198 attackbots
Jun 18 03:15:13 server sshd\[132552\]: Invalid user nashida from 162.243.158.198
Jun 18 03:15:13 server sshd\[132552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.158.198
Jun 18 03:15:15 server sshd\[132552\]: Failed password for invalid user nashida from 162.243.158.198 port 51984 ssh2
...
2019-10-09 16:18:13
162.247.74.200 attack
Oct  9 10:00:24 rotator sshd\[20439\]: Failed password for root from 162.247.74.200 port 49008 ssh2Oct  9 10:00:27 rotator sshd\[20439\]: Failed password for root from 162.247.74.200 port 49008 ssh2Oct  9 10:00:29 rotator sshd\[20439\]: Failed password for root from 162.247.74.200 port 49008 ssh2Oct  9 10:00:32 rotator sshd\[20439\]: Failed password for root from 162.247.74.200 port 49008 ssh2Oct  9 10:00:35 rotator sshd\[20439\]: Failed password for root from 162.247.74.200 port 49008 ssh2Oct  9 10:00:37 rotator sshd\[20439\]: Failed password for root from 162.247.74.200 port 49008 ssh2
...
2019-10-09 16:07:21

Recently Reported IPs

213.63.255.166 5.97.165.10 128.135.185.56 84.111.196.143
248.36.35.70 70.206.67.76 58.8.92.201 57.17.188.11
44.165.103.129 38.59.3.225 109.63.134.161 108.231.63.218
81.105.31.199 57.113.192.166 213.174.210.220 142.47.40.56
2.79.92.25 156.48.111.135 49.116.45.111 238.194.123.151