Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Bulgaria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.138.221.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26825
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.138.221.54.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 14:24:13 CST 2022
;; MSG SIZE  rcvd: 107
Host info
54.221.138.164.in-addr.arpa domain name pointer betrvkrn.superdnsserver.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
54.221.138.164.in-addr.arpa	name = betrvkrn.superdnsserver.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
118.25.123.165 attackbots
Apr 30 00:24:48 mail sshd[8014]: Failed password for root from 118.25.123.165 port 41610 ssh2
...
2020-05-01 19:01:29
106.12.31.186 attackbotsspam
May  1 11:46:53 mout sshd[17032]: Invalid user testing from 106.12.31.186 port 32786
2020-05-01 19:09:30
206.253.166.69 attackspam
DATE:2020-05-01 07:53:39,IP:206.253.166.69,MATCHES:10,PORT:ssh
2020-05-01 18:48:45
151.252.141.157 attackspambots
May  1 07:49:38 firewall sshd[3553]: Invalid user nessa from 151.252.141.157
May  1 07:49:41 firewall sshd[3553]: Failed password for invalid user nessa from 151.252.141.157 port 56776 ssh2
May  1 07:53:22 firewall sshd[3648]: Invalid user saku from 151.252.141.157
...
2020-05-01 18:56:24
46.101.149.23 attack
$f2bV_matches
2020-05-01 18:38:54
134.209.50.169 attackbots
May  1 12:13:55 server sshd[25136]: Failed password for invalid user tmi from 134.209.50.169 port 44000 ssh2
May  1 12:19:35 server sshd[26412]: Failed password for invalid user callcenter from 134.209.50.169 port 55066 ssh2
May  1 12:24:59 server sshd[27608]: Failed password for root from 134.209.50.169 port 37904 ssh2
2020-05-01 18:56:56
219.250.188.107 attack
Invalid user tb from 219.250.188.107 port 38355
2020-05-01 18:45:21
92.147.254.243 attackbots
Invalid user deploy from 92.147.254.243 port 51804
2020-05-01 19:12:15
51.77.201.36 attack
Invalid user falko from 51.77.201.36 port 50598
2020-05-01 18:35:28
187.72.167.124 attackbots
Invalid user philipp from 187.72.167.124 port 41076
2020-05-01 18:52:50
122.202.48.251 attackspam
SSH Brute-Forcing (server1)
2020-05-01 18:59:58
106.12.86.238 attack
Invalid user nash from 106.12.86.238 port 49968
2020-05-01 19:08:53
49.72.212.22 attackbotsspam
2020-05-01T04:46:58.610209shield sshd\[13109\]: Invalid user hung from 49.72.212.22 port 42445
2020-05-01T04:46:58.615924shield sshd\[13109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.72.212.22
2020-05-01T04:47:01.031477shield sshd\[13109\]: Failed password for invalid user hung from 49.72.212.22 port 42445 ssh2
2020-05-01T04:49:23.676237shield sshd\[13334\]: Invalid user hs from 49.72.212.22 port 52897
2020-05-01T04:49:23.680607shield sshd\[13334\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.72.212.22
2020-05-01 18:38:29
51.83.68.213 attackbotsspam
Invalid user mongouser from 51.83.68.213 port 57742
2020-05-01 18:35:02
128.199.102.17 attack
May  1 10:38:16 ns3164893 sshd[11249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.102.17  user=root
May  1 10:38:18 ns3164893 sshd[11249]: Failed password for root from 128.199.102.17 port 56823 ssh2
...
2020-05-01 18:59:26

Recently Reported IPs

164.138.221.13 164.138.221.81 164.138.223.136 164.138.223.145
164.138.220.33 164.138.248.202 164.138.249.23 164.138.223.167
164.15.59.215 164.151.129.20 164.151.136.180 164.151.129.19
164.151.130.93 164.151.5.7 164.138.248.201 164.151.136.75
164.154.226.126 164.154.226.94 164.151.131.26 164.154.226.12