Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Estacada

Region: Oregon

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 72.19.54.28
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60694
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;72.19.54.28.			IN	A

;; AUTHORITY SECTION:
.			586	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020082401 1800 900 604800 86400

;; Query time: 79 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Aug 25 07:34:35 CST 2020
;; MSG SIZE  rcvd: 115
Host info
28.54.19.72.in-addr.arpa domain name pointer pppoe-72-19-54-028.cascadeaccess.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
28.54.19.72.in-addr.arpa	name = pppoe-72-19-54-028.cascadeaccess.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
81.22.45.107 attackbots
Nov  9 08:54:08 mc1 kernel: \[4572337.956104\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.107 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=54449 PROTO=TCP SPT=49947 DPT=54449 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  9 08:55:46 mc1 kernel: \[4572436.245631\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.107 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=7962 PROTO=TCP SPT=49947 DPT=53974 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  9 08:58:45 mc1 kernel: \[4572614.919660\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.107 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=25596 PROTO=TCP SPT=49947 DPT=53638 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-09 16:21:08
45.40.166.166 attackspam
REQUESTED PAGE: /xmlrpc.php
2019-11-09 16:23:50
67.205.180.200 attackbotsspam
67.205.180.200 - - [09/Nov/2019:07:28:07 +0100] "POST /wp-login.php HTTP/1.1" 200 2117 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
67.205.180.200 - - [09/Nov/2019:07:28:07 +0100] "POST /wp-login.php HTTP/1.1" 200 2113 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-11-09 16:01:11
89.252.130.59 attackspam
Automatic report - XMLRPC Attack
2019-11-09 16:15:42
222.186.173.183 attackbotsspam
DATE:2019-11-09 09:25:37, IP:222.186.173.183, PORT:ssh SSH brute force auth on honeypot server (honey-neo-dc-bis)
2019-11-09 16:30:58
81.171.75.48 attackspambots
\[2019-11-09 02:57:19\] NOTICE\[2601\] chan_sip.c: Registration from '\' failed for '81.171.75.48:56135' - Wrong password
\[2019-11-09 02:57:19\] SECURITY\[2634\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-11-09T02:57:19.383-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="2864",SessionID="0x7fdf2c473798",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/81.171.75.48/56135",Challenge="118dfc17",ReceivedChallenge="118dfc17",ReceivedHash="c1740ad31ff8b2c412fd216516cc72f7"
\[2019-11-09 02:58:00\] NOTICE\[2601\] chan_sip.c: Registration from '\' failed for '81.171.75.48:53104' - Wrong password
\[2019-11-09 02:58:00\] SECURITY\[2634\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-11-09T02:58:00.860-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="3469",SessionID="0x7fdf2c3f5928",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/81.171.75.48
2019-11-09 16:19:11
184.168.152.99 attack
Automatic report - XMLRPC Attack
2019-11-09 16:11:47
49.235.130.25 attackspambots
Nov  5 12:03:53 srv1 sshd[1168]: Invalid user xbot_premium from 49.235.130.25
Nov  5 12:03:55 srv1 sshd[1168]: Failed password for invalid user xbot_premium from 49.235.130.25 port 35782 ssh2
Nov  5 12:16:08 srv1 sshd[11825]: Invalid user anurag from 49.235.130.25
Nov  5 12:16:11 srv1 sshd[11825]: Failed password for invalid user anurag from 49.235.130.25 port 40866 ssh2
Nov  5 12:20:25 srv1 sshd[15188]: Invalid user tester from 49.235.130.25


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.235.130.25
2019-11-09 16:00:43
80.91.176.139 attackspam
$f2bV_matches
2019-11-09 16:32:23
130.180.66.98 attackbotsspam
Nov  9 09:00:52 mout sshd[21457]: Invalid user pdnsd from 130.180.66.98 port 37566
2019-11-09 16:27:55
65.151.188.128 attackbots
Nov  6 09:37:32 rb06 sshd[8529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.151.188.128  user=r.r
Nov  6 09:37:34 rb06 sshd[8529]: Failed password for r.r from 65.151.188.128 port 34248 ssh2
Nov  6 09:37:34 rb06 sshd[8529]: Received disconnect from 65.151.188.128: 11: Bye Bye [preauth]
Nov  6 09:56:08 rb06 sshd[21976]: Failed password for invalid user admin from 65.151.188.128 port 40646 ssh2
Nov  6 09:56:08 rb06 sshd[21976]: Received disconnect from 65.151.188.128: 11: Bye Bye [preauth]
Nov  6 09:59:43 rb06 sshd[30631]: Failed password for invalid user sal from 65.151.188.128 port 53380 ssh2
Nov  6 09:59:43 rb06 sshd[30631]: Received disconnect from 65.151.188.128: 11: Bye Bye [preauth]
Nov  6 10:03:16 rb06 sshd[32260]: Failed password for invalid user nbtyadmin from 65.151.188.128 port 37884 ssh2
Nov  6 10:03:17 rb06 sshd[32260]: Received disconnect from 65.151.188.128: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://ww
2019-11-09 16:13:46
83.110.200.239 attackbotsspam
Caught in portsentry honeypot
2019-11-09 16:13:22
97.74.6.64 attackbotsspam
Automatic report - XMLRPC Attack
2019-11-09 16:15:24
89.45.17.11 attackbotsspam
2019-11-09T07:53:38.980465shield sshd\[20875\]: Invalid user steve from 89.45.17.11 port 45972
2019-11-09T07:53:38.986057shield sshd\[20875\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.45.17.11
2019-11-09T07:53:40.854271shield sshd\[20875\]: Failed password for invalid user steve from 89.45.17.11 port 45972 ssh2
2019-11-09T07:57:43.382688shield sshd\[21225\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.45.17.11  user=root
2019-11-09T07:57:45.551932shield sshd\[21225\]: Failed password for root from 89.45.17.11 port 36792 ssh2
2019-11-09 16:10:46
133.130.123.238 attackbotsspam
Nov  8 22:23:13 mockhub sshd[7216]: Failed password for root from 133.130.123.238 port 47882 ssh2
Nov  8 22:27:24 mockhub sshd[7331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.123.238
...
2019-11-09 16:24:10

Recently Reported IPs

207.55.116.163 185.237.224.91 212.51.62.10 5.250.110.1
95.160.24.120 189.254.226.140 1.28.126.49 105.8.255.38
213.126.15.185 12.123.155.255 78.179.81.167 186.179.100.71
96.27.208.168 3.88.158.175 73.21.84.225 54.189.134.152
118.39.117.8 49.41.68.86 217.43.17.159 20.42.170.60