Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Springfield

Region: Missouri

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.54.97.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13312
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.54.97.41.			IN	A

;; AUTHORITY SECTION:
.			311	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023042400 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 25 02:09:10 CST 2023
;; MSG SIZE  rcvd: 105
Host info
41.97.54.104.in-addr.arpa domain name pointer 104-54-97-41.lightspeed.spfdmo.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
41.97.54.104.in-addr.arpa	name = 104-54-97-41.lightspeed.spfdmo.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
105.235.137.144 attackbots
105.235.137.144 wrong_password 29times
2020-10-09 18:10:05
183.146.185.57 attackbots
Oct  9 00:19:15 srv01 postfix/smtpd\[18184\]: warning: unknown\[183.146.185.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  9 00:19:27 srv01 postfix/smtpd\[18184\]: warning: unknown\[183.146.185.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  9 00:19:43 srv01 postfix/smtpd\[18184\]: warning: unknown\[183.146.185.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  9 00:20:02 srv01 postfix/smtpd\[18184\]: warning: unknown\[183.146.185.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  9 00:20:15 srv01 postfix/smtpd\[18184\]: warning: unknown\[183.146.185.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-10-09 18:24:54
54.198.253.45 attackspambots
SSH Brute-Force reported by Fail2Ban
2020-10-09 18:40:06
193.70.0.42 attackbotsspam
$f2bV_matches
2020-10-09 18:40:29
200.194.3.2 attackbotsspam
Automatic report - Port Scan Attack
2020-10-09 18:35:54
134.175.148.100 attackspambots
IP blocked
2020-10-09 18:06:27
112.29.172.148 attackbots
2020-10-09T10:18:22.142318ionos.janbro.de sshd[238487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.29.172.148  user=root
2020-10-09T10:18:23.929817ionos.janbro.de sshd[238487]: Failed password for root from 112.29.172.148 port 44448 ssh2
2020-10-09T10:22:25.728250ionos.janbro.de sshd[238508]: Invalid user info1 from 112.29.172.148 port 41764
2020-10-09T10:22:25.761109ionos.janbro.de sshd[238508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.29.172.148
2020-10-09T10:22:25.728250ionos.janbro.de sshd[238508]: Invalid user info1 from 112.29.172.148 port 41764
2020-10-09T10:22:28.242098ionos.janbro.de sshd[238508]: Failed password for invalid user info1 from 112.29.172.148 port 41764 ssh2
2020-10-09T10:26:28.313337ionos.janbro.de sshd[238530]: Invalid user library from 112.29.172.148 port 39079
2020-10-09T10:26:28.357645ionos.janbro.de sshd[238530]: pam_unix(sshd:auth): authentication failure; lo
...
2020-10-09 18:28:00
157.230.243.22 attackspambots
157.230.243.22 - - [09/Oct/2020:11:20:28 +0100] "POST /wp-login.php HTTP/1.1" 200 2252 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.230.243.22 - - [09/Oct/2020:11:20:30 +0100] "POST /wp-login.php HTTP/1.1" 200 2255 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.230.243.22 - - [09/Oct/2020:11:20:36 +0100] "POST /xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-09 18:24:23
218.92.0.211 attackbotsspam
Oct  9 10:05:08 ip-172-31-61-156 sshd[20961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.211  user=root
Oct  9 10:05:09 ip-172-31-61-156 sshd[20961]: Failed password for root from 218.92.0.211 port 28340 ssh2
...
2020-10-09 18:06:10
222.117.13.84 attackbots
Oct  9 11:50:06 ift sshd\[56560\]: Invalid user lipp from 222.117.13.84Oct  9 11:50:08 ift sshd\[56560\]: Failed password for invalid user lipp from 222.117.13.84 port 54544 ssh2Oct  9 11:53:03 ift sshd\[56847\]: Invalid user odoo from 222.117.13.84Oct  9 11:53:04 ift sshd\[56847\]: Failed password for invalid user odoo from 222.117.13.84 port 42666 ssh2Oct  9 11:56:03 ift sshd\[57403\]: Failed password for root from 222.117.13.84 port 59022 ssh2
...
2020-10-09 18:05:53
85.98.54.155 attackbotsspam
Automatic report - Port Scan Attack
2020-10-09 18:32:38
119.45.21.98 attack
Oct  9 11:50:58 minden010 sshd[20863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.21.98
Oct  9 11:51:00 minden010 sshd[20863]: Failed password for invalid user game from 119.45.21.98 port 47856 ssh2
Oct  9 11:54:45 minden010 sshd[22119]: Failed password for root from 119.45.21.98 port 60118 ssh2
...
2020-10-09 18:30:05
79.137.72.121 attackbots
2020-10-09T05:51:52.6243591495-001 sshd[59177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.ip-79-137-72.eu
2020-10-09T05:51:52.6209381495-001 sshd[59177]: Invalid user marketing from 79.137.72.121 port 37726
2020-10-09T05:51:54.4675381495-001 sshd[59177]: Failed password for invalid user marketing from 79.137.72.121 port 37726 ssh2
2020-10-09T05:55:25.6265661495-001 sshd[59366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.ip-79-137-72.eu  user=root
2020-10-09T05:55:27.8177241495-001 sshd[59366]: Failed password for root from 79.137.72.121 port 42786 ssh2
2020-10-09T05:58:59.1176341495-001 sshd[59521]: Invalid user test from 79.137.72.121 port 47854
...
2020-10-09 18:34:30
106.12.100.206 attackbots
(sshd) Failed SSH login from 106.12.100.206 (CN/China/-): 5 in the last 3600 secs
2020-10-09 18:19:41
195.12.137.73 attackspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-10-09 18:38:35

Recently Reported IPs

164.22.60.31 229.126.254.153 233.202.161.106 20.39.242.247
20.39.242.240 17.39.242.240 159.223.32.59 103.162.98.36
233.50.35.114 195.36.116.6 40.230.170.190 172.249.6.255
43.223.94.11 209.124.238.182 218.32.45.104 218.32.45.116
165.178.66.205 176.80.101.162 171.238.202.245 121.127.10.114