Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 162.94.5.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35338
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;162.94.5.54.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 22:26:49 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 54.5.94.162.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.5.94.162.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.67.194.59 attackspam
Invalid user oracle from 111.67.194.59 port 59986
2020-07-25 08:16:55
182.208.98.210 attackspambots
2020-07-25T07:16:51.011497billing sshd[23293]: Invalid user www from 182.208.98.210 port 60954
2020-07-25T07:16:53.122375billing sshd[23293]: Failed password for invalid user www from 182.208.98.210 port 60954 ssh2
2020-07-25T07:22:16.050393billing sshd[1224]: Invalid user gmodserver from 182.208.98.210 port 37612
...
2020-07-25 08:30:32
123.207.121.169 attackspam
Jul 24 19:05:38 XXX sshd[8327]: Invalid user qpal from 123.207.121.169 port 53286
2020-07-25 08:38:06
107.170.131.23 attackbotsspam
Invalid user server from 107.170.131.23 port 38992
2020-07-25 08:41:21
110.83.165.150 attack
SSH / Telnet Brute Force Attempts on Honeypot
2020-07-25 08:17:23
123.49.47.26 attackbotsspam
fail2ban detected bruce force on ssh iptables
2020-07-25 08:38:34
129.146.46.134 attackbotsspam
Jul 24 23:53:58 django-0 sshd[10389]: Invalid user office from 129.146.46.134
...
2020-07-25 08:36:36
111.61.241.100 attack
Invalid user yuanxun from 111.61.241.100 port 63753
2020-07-25 08:40:38
150.109.147.145 attack
Invalid user ts3bot from 150.109.147.145 port 40198
2020-07-25 08:12:01
158.101.97.4 attackbotsspam
2020-07-24T19:30:32.029611morrigan.ad5gb.com sshd[2995971]: Invalid user temp1 from 158.101.97.4 port 48478
2020-07-24T19:30:34.508441morrigan.ad5gb.com sshd[2995971]: Failed password for invalid user temp1 from 158.101.97.4 port 48478 ssh2
2020-07-25 08:34:20
34.68.180.110 attackspam
malicious Brute-Force reported by https://www.patrick-binder.de
...
2020-07-25 08:23:16
138.197.145.26 attack
Scanned 3 times in the last 24 hours on port 22
2020-07-25 08:36:15
116.85.66.34 attackspambots
Invalid user re from 116.85.66.34 port 52542
2020-07-25 08:39:31
106.53.20.226 attackspambots
Jul 25 01:31:40 pve1 sshd[2759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.20.226 
Jul 25 01:31:42 pve1 sshd[2759]: Failed password for invalid user mysql from 106.53.20.226 port 51400 ssh2
...
2020-07-25 08:18:12
119.45.142.15 attack
Jul 25 01:03:22 lnxweb62 sshd[21768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.142.15
2020-07-25 08:15:25

Recently Reported IPs

86.208.44.237 178.211.87.52 107.164.163.149 151.111.237.49
63.168.4.14 14.79.58.254 50.172.143.41 223.144.10.88
217.204.1.143 83.88.238.4 240.19.223.105 153.222.208.234
148.78.170.135 156.81.253.177 209.81.156.48 180.247.47.16
64.70.78.116 74.14.38.74 2.90.129.56 61.213.214.197