Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Philadelphia

Region: Pennsylvania

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.164.164.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35188
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;216.164.164.54.			IN	A

;; AUTHORITY SECTION:
.			482	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020040101 1800 900 604800 86400

;; Query time: 117 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 02 02:46:40 CST 2020
;; MSG SIZE  rcvd: 118
Host info
54.164.164.216.in-addr.arpa domain name pointer 216-164-164-54.pa.subnet.cable.rcncustomer.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
54.164.164.216.in-addr.arpa	name = 216-164-164-54.pa.subnet.cable.rcncustomer.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.243.162.3 attackspambots
Invalid user gdm from 106.243.162.3 port 55501
2019-12-17 22:02:40
121.132.157.201 attack
Invalid user info from 121.132.157.201 port 47852
2019-12-17 22:26:17
51.38.224.46 attack
Dec 17 14:24:06 sd-53420 sshd\[7805\]: Invalid user logon from 51.38.224.46
Dec 17 14:24:06 sd-53420 sshd\[7805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.224.46
Dec 17 14:24:09 sd-53420 sshd\[7805\]: Failed password for invalid user logon from 51.38.224.46 port 33174 ssh2
Dec 17 14:29:09 sd-53420 sshd\[9667\]: Invalid user 12345 from 51.38.224.46
Dec 17 14:29:09 sd-53420 sshd\[9667\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.224.46
...
2019-12-17 22:05:18
194.204.236.164 attackbotsspam
IP blocked
2019-12-17 22:13:22
79.166.72.77 attackbots
Telnet Server BruteForce Attack
2019-12-17 22:04:54
142.93.172.64 attackbots
Dec 17 01:38:57 web9 sshd\[32568\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.172.64  user=games
Dec 17 01:38:59 web9 sshd\[32568\]: Failed password for games from 142.93.172.64 port 46552 ssh2
Dec 17 01:45:33 web9 sshd\[1269\]: Invalid user hayashi from 142.93.172.64
Dec 17 01:45:33 web9 sshd\[1269\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.172.64
Dec 17 01:45:36 web9 sshd\[1269\]: Failed password for invalid user hayashi from 142.93.172.64 port 58266 ssh2
2019-12-17 22:18:21
129.211.2.241 attackbots
ssh failed login
2019-12-17 22:32:13
1.6.114.75 attackspambots
Dec 16 19:51:45 server sshd\[17804\]: Invalid user oracle1 from 1.6.114.75
Dec 16 19:51:45 server sshd\[17804\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.6.114.75 
Dec 16 19:51:47 server sshd\[17804\]: Failed password for invalid user oracle1 from 1.6.114.75 port 47780 ssh2
Dec 17 09:29:08 server sshd\[30113\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.6.114.75  user=root
Dec 17 09:29:11 server sshd\[30113\]: Failed password for root from 1.6.114.75 port 46006 ssh2
...
2019-12-17 22:15:40
107.189.10.44 attackbots
Invalid user fake from 107.189.10.44 port 54540
2019-12-17 22:21:10
40.92.41.84 attack
Dec 17 17:26:44 debian-2gb-vpn-nbg1-1 kernel: [971170.787463] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.41.84 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=232 ID=36901 DF PROTO=TCP SPT=6327 DPT=25 WINDOW=0 RES=0x00 ACK RST URGP=0
2019-12-17 22:32:37
210.245.26.142 attack
Dec 17 15:19:31 mc1 kernel: \[751192.186754\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=210.245.26.142 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=3756 PROTO=TCP SPT=51862 DPT=9104 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 17 15:20:28 mc1 kernel: \[751249.396149\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=210.245.26.142 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=39706 PROTO=TCP SPT=51862 DPT=8667 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 17 15:22:16 mc1 kernel: \[751357.510451\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=210.245.26.142 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=26700 PROTO=TCP SPT=51862 DPT=8887 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-12-17 22:24:02
45.163.216.23 attack
Dec 17 15:20:10 ns3042688 sshd\[13717\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.163.216.23  user=uucp
Dec 17 15:20:12 ns3042688 sshd\[13717\]: Failed password for uucp from 45.163.216.23 port 51304 ssh2
Dec 17 15:26:39 ns3042688 sshd\[16282\]: Invalid user amanohys from 45.163.216.23
Dec 17 15:26:39 ns3042688 sshd\[16282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.163.216.23 
Dec 17 15:26:41 ns3042688 sshd\[16282\]: Failed password for invalid user amanohys from 45.163.216.23 port 32920 ssh2
...
2019-12-17 22:36:05
162.243.59.16 attackbots
2019-12-17T14:59:33.552971scmdmz1 sshd[28718]: Invalid user mortland from 162.243.59.16 port 34116
2019-12-17T14:59:33.555681scmdmz1 sshd[28718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.59.16
2019-12-17T14:59:33.552971scmdmz1 sshd[28718]: Invalid user mortland from 162.243.59.16 port 34116
2019-12-17T14:59:35.305106scmdmz1 sshd[28718]: Failed password for invalid user mortland from 162.243.59.16 port 34116 ssh2
2019-12-17T15:04:59.922144scmdmz1 sshd[29510]: Invalid user wubbena from 162.243.59.16 port 42914
...
2019-12-17 22:08:26
222.186.175.220 attack
Dec 17 15:26:35 eventyay sshd[19644]: Failed password for root from 222.186.175.220 port 63110 ssh2
Dec 17 15:26:37 eventyay sshd[19644]: Failed password for root from 222.186.175.220 port 63110 ssh2
Dec 17 15:26:41 eventyay sshd[19644]: Failed password for root from 222.186.175.220 port 63110 ssh2
Dec 17 15:26:44 eventyay sshd[19644]: Failed password for root from 222.186.175.220 port 63110 ssh2
...
2019-12-17 22:30:37
24.51.198.19 attackbots
Honeypot attack, port: 23, PTR: crlspr-24.51.198.19.myacc.net.
2019-12-17 22:27:56

Recently Reported IPs

68.226.218.223 135.88.104.46 111.212.63.199 216.250.126.73
158.240.33.150 90.225.252.168 165.108.132.184 220.123.115.237
120.81.220.90 209.217.139.221 54.175.241.167 106.78.189.246
114.18.78.154 64.181.193.180 3.45.54.125 60.221.48.23
191.186.26.160 207.202.120.78 110.98.246.95 195.95.150.19