Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Israel

Internet Service Provider: Partner

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.54.142.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58387
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.54.142.241.			IN	A

;; AUTHORITY SECTION:
.			315	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019111601 1800 900 604800 86400

;; Query time: 108 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 17 04:54:25 CST 2019
;; MSG SIZE  rcvd: 116
Host info
241.142.54.2.in-addr.arpa domain name pointer 2-54-142-241.orange.net.il.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
241.142.54.2.in-addr.arpa	name = 2-54-142-241.orange.net.il.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
63.240.240.74 attackbots
SSH login attempts.
2020-05-11 13:24:25
79.137.254.51 attackspam
LAV,DEF GET /en//wp-includes/wlwmanifest.xml
2020-05-11 13:12:23
106.75.103.36 attackbots
May 11 05:50:48 srv-ubuntu-dev3 sshd[112590]: Invalid user demouser from 106.75.103.36
May 11 05:50:48 srv-ubuntu-dev3 sshd[112590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.103.36
May 11 05:50:48 srv-ubuntu-dev3 sshd[112590]: Invalid user demouser from 106.75.103.36
May 11 05:50:50 srv-ubuntu-dev3 sshd[112590]: Failed password for invalid user demouser from 106.75.103.36 port 41804 ssh2
May 11 05:55:28 srv-ubuntu-dev3 sshd[113344]: Invalid user cgh from 106.75.103.36
May 11 05:55:28 srv-ubuntu-dev3 sshd[113344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.103.36
May 11 05:55:28 srv-ubuntu-dev3 sshd[113344]: Invalid user cgh from 106.75.103.36
May 11 05:55:30 srv-ubuntu-dev3 sshd[113344]: Failed password for invalid user cgh from 106.75.103.36 port 36066 ssh2
...
2020-05-11 13:05:32
206.189.202.165 attackspam
May 11 05:46:36 DAAP sshd[25127]: Invalid user joshua from 206.189.202.165 port 34958
May 11 05:46:36 DAAP sshd[25127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.202.165
May 11 05:46:36 DAAP sshd[25127]: Invalid user joshua from 206.189.202.165 port 34958
May 11 05:46:38 DAAP sshd[25127]: Failed password for invalid user joshua from 206.189.202.165 port 34958 ssh2
May 11 05:55:28 DAAP sshd[25220]: Invalid user user from 206.189.202.165 port 55156
...
2020-05-11 13:08:33
125.124.254.31 attackbots
May 11 03:52:22 onepixel sshd[2936581]: Failed password for root from 125.124.254.31 port 43770 ssh2
May 11 03:55:29 onepixel sshd[2936923]: Invalid user nagios1 from 125.124.254.31 port 56978
May 11 03:55:29 onepixel sshd[2936923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.254.31 
May 11 03:55:29 onepixel sshd[2936923]: Invalid user nagios1 from 125.124.254.31 port 56978
May 11 03:55:31 onepixel sshd[2936923]: Failed password for invalid user nagios1 from 125.124.254.31 port 56978 ssh2
2020-05-11 13:05:00
157.245.208.74 attackbotsspam
firewall-block, port(s): 17401/tcp
2020-05-11 13:31:16
159.89.166.91 attack
20 attempts against mh-ssh on install-test
2020-05-11 13:37:33
121.203.202.122 attack
May 11 05:55:06 mail sshd[3030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.203.202.122 
May 11 05:55:08 mail sshd[3030]: Failed password for invalid user admin from 121.203.202.122 port 54541 ssh2
...
2020-05-11 13:29:20
190.29.112.209 attackspam
May 11 05:54:59 mail sshd[2979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.29.112.209 
May 11 05:55:00 mail sshd[2979]: Failed password for invalid user admin from 190.29.112.209 port 47059 ssh2
...
2020-05-11 13:40:49
121.63.17.157 attackbots
Port probing on unauthorized port 23
2020-05-11 13:01:29
118.89.229.84 attack
May 11 01:22:59 NPSTNNYC01T sshd[2723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.229.84
May 11 01:23:00 NPSTNNYC01T sshd[2723]: Failed password for invalid user test from 118.89.229.84 port 52176 ssh2
May 11 01:29:43 NPSTNNYC01T sshd[3418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.229.84
...
2020-05-11 13:38:30
112.85.42.174 attackbotsspam
2020-05-11T07:10:18.556384centos sshd[21802]: Failed password for root from 112.85.42.174 port 26642 ssh2
2020-05-11T07:10:22.535061centos sshd[21802]: Failed password for root from 112.85.42.174 port 26642 ssh2
2020-05-11T07:10:27.291420centos sshd[21802]: Failed password for root from 112.85.42.174 port 26642 ssh2
...
2020-05-11 13:14:30
114.67.104.59 attackbotsspam
May 11 12:28:25 webhost01 sshd[20251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.104.59
May 11 12:28:27 webhost01 sshd[20251]: Failed password for invalid user tssrv from 114.67.104.59 port 50884 ssh2
...
2020-05-11 13:35:09
203.129.194.10 attackspam
20/5/10@23:55:24: FAIL: Alarm-Intrusion address from=203.129.194.10
20/5/10@23:55:25: FAIL: Alarm-Intrusion address from=203.129.194.10
...
2020-05-11 13:12:59
190.187.112.3 attackbots
srv02 SSH BruteForce Attacks 22 ..
2020-05-11 13:33:53

Recently Reported IPs

188.83.103.113 196.202.83.164 200.197.96.87 89.39.79.110
113.170.175.155 13.183.150.237 251.57.251.12 187.50.34.5
232.58.185.168 151.252.132.207 35.214.255.97 213.145.51.218
235.151.148.42 193.228.92.247 167.71.196.203 248.138.160.94
62.56.128.31 223.19.157.15 213.41.201.245 229.250.105.56