Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.109.216.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33550
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.109.216.54.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 75 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 03:38:07 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 54.216.109.13.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.216.109.13.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
5.34.176.6 attackspambots
Jan 25 07:29:47 [host] sshd[24351]: Invalid user xian from 5.34.176.6
Jan 25 07:29:47 [host] sshd[24351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.34.176.6
Jan 25 07:29:49 [host] sshd[24351]: Failed password for invalid user xian from 5.34.176.6 port 52396 ssh2
2020-01-25 14:37:20
58.33.31.82 attack
Jan 25 07:27:44 meumeu sshd[26467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.33.31.82 
Jan 25 07:27:46 meumeu sshd[26467]: Failed password for invalid user ftp from 58.33.31.82 port 56449 ssh2
Jan 25 07:30:47 meumeu sshd[26868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.33.31.82 
...
2020-01-25 14:54:41
222.186.180.130 attack
Jan 25 07:40:53 h2177944 sshd\[20694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130  user=root
Jan 25 07:40:55 h2177944 sshd\[20694\]: Failed password for root from 222.186.180.130 port 20919 ssh2
Jan 25 07:40:57 h2177944 sshd\[20694\]: Failed password for root from 222.186.180.130 port 20919 ssh2
Jan 25 07:41:00 h2177944 sshd\[20694\]: Failed password for root from 222.186.180.130 port 20919 ssh2
...
2020-01-25 14:53:46
129.211.82.237 attack
Jan 25 07:19:11 localhost sshd\[11614\]: Invalid user do from 129.211.82.237 port 58292
Jan 25 07:19:11 localhost sshd\[11614\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.82.237
Jan 25 07:19:13 localhost sshd\[11614\]: Failed password for invalid user do from 129.211.82.237 port 58292 ssh2
2020-01-25 14:39:38
180.251.246.9 attack
20/1/24@23:54:54: FAIL: Alarm-Network address from=180.251.246.9
...
2020-01-25 14:51:26
156.236.119.182 attackspam
Jan 25 06:58:55 OPSO sshd\[28758\]: Invalid user marisa from 156.236.119.182 port 48490
Jan 25 06:58:55 OPSO sshd\[28758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.236.119.182
Jan 25 06:58:57 OPSO sshd\[28758\]: Failed password for invalid user marisa from 156.236.119.182 port 48490 ssh2
Jan 25 07:03:12 OPSO sshd\[29699\]: Invalid user www from 156.236.119.182 port 44480
Jan 25 07:03:12 OPSO sshd\[29699\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.236.119.182
2020-01-25 14:35:32
51.68.127.137 attackspambots
Jan 22 16:51:14 admin sshd[3937]: Invalid user mongkol from 51.68.127.137 port 36684
Jan 22 16:51:14 admin sshd[3937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.127.137
Jan 22 16:51:16 admin sshd[3937]: Failed password for invalid user mongkol from 51.68.127.137 port 36684 ssh2
Jan 22 16:51:16 admin sshd[3937]: Received disconnect from 51.68.127.137 port 36684:11: Bye Bye [preauth]
Jan 22 16:51:16 admin sshd[3937]: Disconnected from 51.68.127.137 port 36684 [preauth]
Jan 22 17:10:52 admin sshd[5100]: Invalid user dylan from 51.68.127.137 port 36616
Jan 22 17:10:52 admin sshd[5100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.127.137
Jan 22 17:10:53 admin sshd[5100]: Failed password for invalid user dylan from 51.68.127.137 port 36616 ssh2
Jan 22 17:10:53 admin sshd[5100]: Received disconnect from 51.68.127.137 port 36616:11: Bye Bye [preauth]
Jan 22 17:10:53 admin sshd[........
-------------------------------
2020-01-25 15:00:01
60.13.172.9 attackspam
Unauthorized connection attempt detected from IP address 60.13.172.9 to port 22 [T]
2020-01-25 14:55:32
113.135.86.40 attackbotsspam
Fail2Ban - FTP Abuse Attempt
2020-01-25 14:33:25
217.92.32.237 attackspam
Unauthorized connection attempt detected from IP address 217.92.32.237 to port 2220 [J]
2020-01-25 15:05:18
192.144.157.33 attack
Jan 24 19:51:59 eddieflores sshd\[3544\]: Invalid user lanto from 192.144.157.33
Jan 24 19:51:59 eddieflores sshd\[3544\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.157.33
Jan 24 19:52:01 eddieflores sshd\[3544\]: Failed password for invalid user lanto from 192.144.157.33 port 38980 ssh2
Jan 24 19:55:47 eddieflores sshd\[4095\]: Invalid user ww from 192.144.157.33
Jan 24 19:55:47 eddieflores sshd\[4095\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.157.33
2020-01-25 14:34:12
51.68.44.158 attackbots
Jan 25 06:10:51 hcbbdb sshd\[9655\]: Invalid user kinder from 51.68.44.158
Jan 25 06:10:51 hcbbdb sshd\[9655\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.ip-51-68-44.eu
Jan 25 06:10:53 hcbbdb sshd\[9655\]: Failed password for invalid user kinder from 51.68.44.158 port 42270 ssh2
Jan 25 06:12:30 hcbbdb sshd\[9900\]: Invalid user jed from 51.68.44.158
Jan 25 06:12:30 hcbbdb sshd\[9900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.ip-51-68-44.eu
2020-01-25 14:30:52
182.61.37.144 attackbots
Jan 25 06:56:48 nextcloud sshd\[12518\]: Invalid user stef from 182.61.37.144
Jan 25 06:56:48 nextcloud sshd\[12518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.37.144
Jan 25 06:56:50 nextcloud sshd\[12518\]: Failed password for invalid user stef from 182.61.37.144 port 46932 ssh2
2020-01-25 14:43:38
159.203.201.23 attackbotsspam
unauthorized connection attempt
2020-01-25 14:34:56
36.77.169.69 attackspambots
20/1/24@23:55:07: FAIL: Alarm-Network address from=36.77.169.69
...
2020-01-25 14:41:33

Recently Reported IPs

13.107.253.38 13.112.241.132 13.112.184.79 13.112.68.113
13.112.239.158 13.112.137.252 13.112.255.185 13.112.8.70
13.112.111.255 13.109.145.37 13.113.125.182 13.113.139.184
13.113.137.0 13.113.180.190 13.113.145.248 13.113.161.20
13.113.200.29 13.113.209.238 13.113.155.233 13.113.156.75