Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 204.54.199.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64398
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;204.54.199.52.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 03:40:46 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 52.199.54.204.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 52.199.54.204.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
53.84.255.239 attackbotsspam
May 01 07:35:17 tcp        0      0 r.ca:22            53.84.255.239:24037         SYN_RECV
2020-05-02 01:05:49
106.13.26.29 attackbotsspam
$f2bV_matches
2020-05-02 00:52:19
162.243.145.83 attack
GET /ReportServer HTTP/1.1
2020-05-02 01:04:05
182.61.57.103 attackspam
May  1 16:08:21 roki-contabo sshd\[16418\]: Invalid user vanessa from 182.61.57.103
May  1 16:08:21 roki-contabo sshd\[16418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.57.103
May  1 16:08:24 roki-contabo sshd\[16418\]: Failed password for invalid user vanessa from 182.61.57.103 port 53518 ssh2
May  1 16:15:59 roki-contabo sshd\[16529\]: Invalid user user1 from 182.61.57.103
May  1 16:15:59 roki-contabo sshd\[16529\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.57.103
...
2020-05-02 01:22:23
162.243.145.81 attack
2375/tcp 8087/tcp 27017/tcp
[2020-04-29/30]3pkt
2020-05-02 01:09:59
180.76.141.184 attack
$f2bV_matches
2020-05-02 01:17:57
137.27.176.186 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-05-02 01:22:09
200.29.32.205 attack
SSH/22 MH Probe, BF, Hack -
2020-05-02 00:54:13
146.120.85.68 attack
23/tcp 23/tcp 23/tcp...
[2020-04-18/30]6pkt,1pt.(tcp)
2020-05-02 00:50:40
51.184.173.218 attackspambots
May 01 07:35:17 tcp        0      0 r.ca:22            51.184.173.218:35324        SYN_RECV
2020-05-02 01:07:21
129.204.100.186 attackbots
May  1 18:42:25 h2779839 sshd[9927]: Invalid user john from 129.204.100.186 port 60360
May  1 18:42:25 h2779839 sshd[9927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.100.186
May  1 18:42:25 h2779839 sshd[9927]: Invalid user john from 129.204.100.186 port 60360
May  1 18:42:27 h2779839 sshd[9927]: Failed password for invalid user john from 129.204.100.186 port 60360 ssh2
May  1 18:46:01 h2779839 sshd[9997]: Invalid user gum from 129.204.100.186 port 46982
May  1 18:46:01 h2779839 sshd[9997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.100.186
May  1 18:46:01 h2779839 sshd[9997]: Invalid user gum from 129.204.100.186 port 46982
May  1 18:46:03 h2779839 sshd[9997]: Failed password for invalid user gum from 129.204.100.186 port 46982 ssh2
May  1 18:49:45 h2779839 sshd[10056]: Invalid user sims from 129.204.100.186 port 33610
...
2020-05-02 01:00:24
223.204.217.125 attackbotsspam
Unauthorized connection attempt from IP address 223.204.217.125 on Port 445(SMB)
2020-05-02 00:43:17
152.136.90.196 attackbotsspam
May  1 13:28:28 ns392434 sshd[12930]: Invalid user qyq from 152.136.90.196 port 36616
May  1 13:28:28 ns392434 sshd[12930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.90.196
May  1 13:28:28 ns392434 sshd[12930]: Invalid user qyq from 152.136.90.196 port 36616
May  1 13:28:30 ns392434 sshd[12930]: Failed password for invalid user qyq from 152.136.90.196 port 36616 ssh2
May  1 13:41:56 ns392434 sshd[13305]: Invalid user whq from 152.136.90.196 port 34616
May  1 13:41:56 ns392434 sshd[13305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.90.196
May  1 13:41:56 ns392434 sshd[13305]: Invalid user whq from 152.136.90.196 port 34616
May  1 13:41:58 ns392434 sshd[13305]: Failed password for invalid user whq from 152.136.90.196 port 34616 ssh2
May  1 13:47:49 ns392434 sshd[13493]: Invalid user cron from 152.136.90.196 port 38136
2020-05-02 00:50:05
125.160.213.150 attackspambots
139/tcp 445/tcp
[2020-04-29]2pkt
2020-05-02 00:58:32
122.51.195.104 attack
May  1 15:47:49 piServer sshd[13325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.195.104 
May  1 15:47:51 piServer sshd[13325]: Failed password for invalid user bobby from 122.51.195.104 port 53924 ssh2
May  1 15:50:57 piServer sshd[13597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.195.104 
...
2020-05-02 00:54:28

Recently Reported IPs

167.119.203.73 138.55.32.179 155.248.100.131 175.151.158.227
66.146.4.185 120.252.195.209 198.119.119.143 192.166.71.187
174.182.131.232 203.128.215.77 76.52.38.147 16.160.57.177
49.152.118.16 58.133.79.136 17.215.219.146 248.223.4.92
208.26.253.139 152.39.64.176 174.170.42.65 83.107.255.44