Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: New Taipei

Region: New Taipei

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 123.194.229.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51565
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;123.194.229.54.			IN	A

;; AUTHORITY SECTION:
.			288	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010702 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 08 09:02:15 CST 2022
;; MSG SIZE  rcvd: 107
Host info
54.229.194.123.in-addr.arpa domain name pointer 123-194-229-54.dynamic.kbronet.com.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
54.229.194.123.in-addr.arpa	name = 123-194-229-54.dynamic.kbronet.com.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
162.243.128.105 attack
Port scanning [2 denied]
2020-08-28 18:41:09
106.12.12.242 attackbots
Invalid user ali from 106.12.12.242 port 37258
2020-08-28 18:46:56
118.69.55.141 attackbotsspam
Aug 28 13:36:53 lukav-desktop sshd\[20025\]: Invalid user anni from 118.69.55.141
Aug 28 13:36:53 lukav-desktop sshd\[20025\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.69.55.141
Aug 28 13:36:55 lukav-desktop sshd\[20025\]: Failed password for invalid user anni from 118.69.55.141 port 56843 ssh2
Aug 28 13:41:24 lukav-desktop sshd\[20170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.69.55.141  user=root
Aug 28 13:41:26 lukav-desktop sshd\[20170\]: Failed password for root from 118.69.55.141 port 33829 ssh2
2020-08-28 18:42:35
112.85.42.173 attackbotsspam
Aug 28 12:43:32 nextcloud sshd\[7009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.173  user=root
Aug 28 12:43:33 nextcloud sshd\[7009\]: Failed password for root from 112.85.42.173 port 25262 ssh2
Aug 28 12:43:43 nextcloud sshd\[7009\]: Failed password for root from 112.85.42.173 port 25262 ssh2
2020-08-28 18:44:46
192.241.230.120 attackspam
firewall-block, port(s): 1364/tcp
2020-08-28 18:30:26
192.241.227.160 attackspam
Port scan denied
2020-08-28 18:35:35
159.89.236.71 attackspambots
Invalid user usuario from 159.89.236.71 port 51490
2020-08-28 18:34:03
180.129.252.23 attackbots
30022/tcp 7022/tcp 5555/tcp...
[2020-06-30/08-27]23pkt,18pt.(tcp)
2020-08-28 18:37:17
158.69.110.31 attackbots
2020-08-28T11:59:41.047312ks3355764 sshd[20401]: Invalid user cdn from 158.69.110.31 port 58802
2020-08-28T11:59:42.584439ks3355764 sshd[20401]: Failed password for invalid user cdn from 158.69.110.31 port 58802 ssh2
...
2020-08-28 18:37:49
220.132.2.18 attack
Port Scan
...
2020-08-28 18:48:55
45.148.121.82 attack
Port scanning [3 denied]
2020-08-28 18:48:04
104.160.31.171 attack
Registration form abuse
2020-08-28 18:25:59
188.166.54.199 attack
$f2bV_matches
2020-08-28 19:07:53
182.23.53.245 attackbots
445/tcp 445/tcp
[2020-08-14/28]2pkt
2020-08-28 18:56:11
152.136.170.27 attackspam
Invalid user anuel from 152.136.170.27 port 39812
2020-08-28 18:56:43

Recently Reported IPs

55.89.116.221 71.202.44.238 101.243.247.116 214.86.196.171
163.172.254.8 2.247.64.134 45.235.235.109 77.138.159.113
174.54.218.118 136.153.99.138 31.89.246.49 30.103.105.36
35.250.5.191 161.118.242.247 76.212.167.101 69.29.130.13
130.226.137.95 252.224.110.161 210.163.245.162 225.64.5.184