Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Merrick

Region: New York

Country: United States

Internet Service Provider: Verizon

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.54.149.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36862
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;108.54.149.6.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030400 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 04 23:29:31 CST 2025
;; MSG SIZE  rcvd: 105
Host info
6.149.54.108.in-addr.arpa domain name pointer pool-108-54-149-6.nycmny.fios.verizon.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
6.149.54.108.in-addr.arpa	name = pool-108-54-149-6.nycmny.fios.verizon.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.24.201.250 attackbotsspam
2019-12-15T09:29:03.874293suse-nuc sshd[22595]: Invalid user ausgrabungsstaette from 185.24.201.250 port 59908
...
2020-01-21 08:19:15
185.181.8.42 attackspam
2019-09-22T07:02:06.059136suse-nuc sshd[1965]: Invalid user ra from 185.181.8.42 port 60164
...
2020-01-21 08:25:58
144.131.134.105 attackbotsspam
2020-01-20T17:08:48.0911071495-001 sshd[1390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=cpe-144-131-134-105.static.nsw.bigpond.net.au
2020-01-20T17:08:48.0810231495-001 sshd[1390]: Invalid user teamspeak from 144.131.134.105 port 49222
2020-01-20T17:08:50.4216931495-001 sshd[1390]: Failed password for invalid user teamspeak from 144.131.134.105 port 49222 ssh2
2020-01-20T18:09:39.7248171495-001 sshd[3918]: Invalid user server from 144.131.134.105 port 52980
2020-01-20T18:09:39.7282301495-001 sshd[3918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=cpe-144-131-134-105.static.nsw.bigpond.net.au
2020-01-20T18:09:39.7248171495-001 sshd[3918]: Invalid user server from 144.131.134.105 port 52980
2020-01-20T18:09:42.4816281495-001 sshd[3918]: Failed password for invalid user server from 144.131.134.105 port 52980 ssh2
2020-01-20T18:14:20.7504631495-001 sshd[4073]: pam_unix(sshd:auth): authentication fail
...
2020-01-21 08:21:31
134.209.183.126 attackbots
Unauthorized connection attempt detected from IP address 134.209.183.126 to port 5900 [J]
2020-01-21 08:31:51
185.22.142.79 attackspam
2019-10-19T19:06:41.505034suse-nuc sshd[31648]: Invalid user informix from 185.22.142.79 port 12814
...
2020-01-21 08:22:55
185.164.63.234 attackspam
2019-12-04T07:44:46.774148suse-nuc sshd[20364]: Invalid user ammelie from 185.164.63.234 port 49676
...
2020-01-21 08:28:06
185.172.144.46 attackspam
2020-01-19T07:18:44.701661suse-nuc sshd[17945]: Invalid user admin from 185.172.144.46 port 55052
...
2020-01-21 08:26:26
185.215.113.210 attackspam
2019-12-09T00:09:48.087122suse-nuc sshd[16967]: Invalid user super from 185.215.113.210 port 33080
...
2020-01-21 08:25:09
112.112.7.202 attack
Unauthorized connection attempt detected from IP address 112.112.7.202 to port 2220 [J]
2020-01-21 08:30:47
183.88.234.190 attack
2020-01-17T15:45:52.143791suse-nuc sshd[29893]: Invalid user admin from 183.88.234.190 port 51107
...
2020-01-21 08:48:58
129.211.24.104 attack
Invalid user gregory from 129.211.24.104
2020-01-21 08:42:14
222.186.30.76 attack
Jan 21 01:39:02 vmanager6029 sshd\[4523\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.76  user=root
Jan 21 01:39:05 vmanager6029 sshd\[4523\]: Failed password for root from 222.186.30.76 port 34523 ssh2
Jan 21 01:39:06 vmanager6029 sshd\[4523\]: Failed password for root from 222.186.30.76 port 34523 ssh2
2020-01-21 08:39:31
117.6.97.138 attackbots
Unauthorized connection attempt detected from IP address 117.6.97.138 to port 2220 [J]
2020-01-21 08:47:44
45.40.201.73 attackbotsspam
Jan 20 20:15:01 firewall sshd[1820]: Invalid user rclar from 45.40.201.73
Jan 20 20:15:04 firewall sshd[1820]: Failed password for invalid user rclar from 45.40.201.73 port 36126 ssh2
Jan 20 20:18:16 firewall sshd[1910]: Invalid user tg from 45.40.201.73
...
2020-01-21 08:24:17
185.105.121.55 attackspam
2019-09-22T12:44:49.828039suse-nuc sshd[5932]: Invalid user pos from 185.105.121.55 port 28099
...
2020-01-21 08:35:38

Recently Reported IPs

43.154.146.8 34.54.224.129 47.83.3.20 20.65.195.125
217.162.219.106 89.213.192.76 98.158.186.209 143.198.235.49
111.150.90.254 18.135.144.144 152.169.47.124 199.59.243.228
188.68.186.175 103.193.177.152 118.86.135.78 187.19.245.157
74.48.78.66 14.153.234.84 103.74.94.40 103.16.62.202