Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Waterford

Region: Michigan

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.11.248.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59885
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;216.11.248.54.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062900 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 30 00:59:39 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 54.248.11.216.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.248.11.216.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
54.36.148.41 attackbotsspam
Automatic report - Banned IP Access
2019-10-13 14:41:46
122.228.208.113 attackbotsspam
*Port Scan* detected from 122.228.208.113 (CN/China/-). 4 hits in the last 110 seconds
2019-10-13 14:02:26
218.22.148.105 attack
Brute force attempt
2019-10-13 14:38:24
132.232.125.152 attack
Oct 13 07:41:09 localhost sshd\[25683\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.125.152  user=root
Oct 13 07:41:10 localhost sshd\[25683\]: Failed password for root from 132.232.125.152 port 34142 ssh2
Oct 13 07:46:51 localhost sshd\[26192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.125.152  user=root
2019-10-13 14:12:03
169.197.112.102 attackbotsspam
$f2bV_matches
2019-10-13 14:45:49
183.6.105.243 attackspambots
Oct 13 07:14:51 vps691689 sshd[26805]: Failed password for root from 183.6.105.243 port 47060 ssh2
Oct 13 07:20:37 vps691689 sshd[26867]: Failed password for root from 183.6.105.243 port 28773 ssh2
...
2019-10-13 14:32:25
181.168.12.115 attackbots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/181.168.12.115/ 
 AR - 1H : (20)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : AR 
 NAME ASN : ASN10318 
 
 IP : 181.168.12.115 
 
 CIDR : 181.168.0.0/19 
 
 PREFIX COUNT : 262 
 
 UNIQUE IP COUNT : 2114560 
 
 
 WYKRYTE ATAKI Z ASN10318 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 3 
 24H - 4 
 
 DateTime : 2019-10-13 05:54:23 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-13 14:20:45
47.22.130.82 attackspam
ssh failed login
2019-10-13 14:21:20
66.249.73.24 attackbots
66.249.73.24 - - - [13/Oct/2019:03:54:04 +0000] "GET /wp-content/plugins/jquery-html5-file-upload/readme.txt HTTP/1.1" 404 564 "-" "Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.96 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" "-" "-"
2019-10-13 14:32:57
111.93.235.210 attackspam
Oct  6 17:20:17 eola sshd[2441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.235.210  user=r.r
Oct  6 17:20:19 eola sshd[2441]: Failed password for r.r from 111.93.235.210 port 36568 ssh2
Oct  6 17:20:19 eola sshd[2441]: Received disconnect from 111.93.235.210 port 36568:11: Bye Bye [preauth]
Oct  6 17:20:19 eola sshd[2441]: Disconnected from 111.93.235.210 port 36568 [preauth]
Oct  6 17:29:21 eola sshd[2569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.235.210  user=r.r
Oct  6 17:29:23 eola sshd[2569]: Failed password for r.r from 111.93.235.210 port 44201 ssh2
Oct  6 17:29:23 eola sshd[2569]: Received disconnect from 111.93.235.210 port 44201:11: Bye Bye [preauth]
Oct  6 17:29:23 eola sshd[2569]: Disconnected from 111.93.235.210 port 44201 [preauth]
Oct  6 17:33:38 eola sshd[2630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost........
-------------------------------
2019-10-13 14:30:13
125.110.131.27 attackspam
Fail2Ban - FTP Abuse Attempt
2019-10-13 14:33:28
219.141.211.74 attackbotsspam
The IP address [219.141.211.74] experienced 5 failed attempts when attempting to log into SSH
2019-10-13 14:32:05
62.90.235.90 attackbots
2019-10-13T09:01:21.639706tmaserv sshd\[20090\]: Invalid user Port@123 from 62.90.235.90 port 49424
2019-10-13T09:01:21.644885tmaserv sshd\[20090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.90.235.90
2019-10-13T09:01:24.162258tmaserv sshd\[20090\]: Failed password for invalid user Port@123 from 62.90.235.90 port 49424 ssh2
2019-10-13T09:06:09.104088tmaserv sshd\[20261\]: Invalid user Password_123 from 62.90.235.90 port 40783
2019-10-13T09:06:09.106466tmaserv sshd\[20261\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.90.235.90
2019-10-13T09:06:10.492768tmaserv sshd\[20261\]: Failed password for invalid user Password_123 from 62.90.235.90 port 40783 ssh2
...
2019-10-13 14:36:18
54.37.158.218 attack
Oct 13 06:54:30 vps691689 sshd[26583]: Failed password for root from 54.37.158.218 port 54529 ssh2
Oct 13 06:58:44 vps691689 sshd[26620]: Failed password for root from 54.37.158.218 port 46382 ssh2
...
2019-10-13 14:23:32
106.12.183.6 attackspam
Oct 13 13:01:43 webhost01 sshd[1733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.183.6
Oct 13 13:01:45 webhost01 sshd[1733]: Failed password for invalid user P@SSWORD2018 from 106.12.183.6 port 53038 ssh2
...
2019-10-13 14:20:16

Recently Reported IPs

220.60.154.237 219.187.88.7 21.169.45.236 214.34.39.53
214.62.67.135 205.61.231.22 219.171.70.128 197.146.11.95
205.12.130.169 19.118.136.179 20.222.226.41 180.4.26.249
199.75.74.32 175.163.242.104 172.151.173.122 164.231.8.61
171.45.77.99 167.17.182.12 155.84.134.222 163.156.169.242