Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: SoftBank

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 221.54.208.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29180
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;221.54.208.53.			IN	A

;; AUTHORITY SECTION:
.			450	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019102001 1800 900 604800 86400

;; Query time: 246 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Oct 21 03:13:22 CST 2019
;; MSG SIZE  rcvd: 117
Host info
53.208.54.221.in-addr.arpa domain name pointer softbank221054208053.bbtec.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
53.208.54.221.in-addr.arpa	name = softbank221054208053.bbtec.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
118.166.108.242 attackbots
Honeypot attack, port: 5555, PTR: 118-166-108-242.dynamic-ip.hinet.net.
2020-02-05 06:40:10
222.186.173.142 attack
02/04/2020-17:44:12.126201 222.186.173.142 Protocol: 6 ET SCAN Potential SSH Scan
2020-02-05 06:44:48
222.186.31.135 attackbots
Feb  5 00:04:09 dcd-gentoo sshd[589]: User root from 222.186.31.135 not allowed because none of user's groups are listed in AllowGroups
Feb  5 00:04:12 dcd-gentoo sshd[589]: error: PAM: Authentication failure for illegal user root from 222.186.31.135
Feb  5 00:04:09 dcd-gentoo sshd[589]: User root from 222.186.31.135 not allowed because none of user's groups are listed in AllowGroups
Feb  5 00:04:12 dcd-gentoo sshd[589]: error: PAM: Authentication failure for illegal user root from 222.186.31.135
Feb  5 00:04:09 dcd-gentoo sshd[589]: User root from 222.186.31.135 not allowed because none of user's groups are listed in AllowGroups
Feb  5 00:04:12 dcd-gentoo sshd[589]: error: PAM: Authentication failure for illegal user root from 222.186.31.135
Feb  5 00:04:12 dcd-gentoo sshd[589]: Failed keyboard-interactive/pam for invalid user root from 222.186.31.135 port 23869 ssh2
...
2020-02-05 07:04:47
185.176.27.102 attackbots
02/04/2020-23:43:02.129984 185.176.27.102 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-02-05 06:48:34
152.26.6.130 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-05 07:17:48
190.37.126.39 attack
Honeypot attack, port: 5555, PTR: 190-37-126-39.dyn.dsl.cantv.net.
2020-02-05 07:09:02
218.92.0.178 attackspam
Feb  4 23:53:41 * sshd[23512]: Failed password for root from 218.92.0.178 port 2516 ssh2
Feb  4 23:53:54 * sshd[23512]: error: maximum authentication attempts exceeded for root from 218.92.0.178 port 2516 ssh2 [preauth]
2020-02-05 07:05:35
148.72.210.28 attackbots
SASL PLAIN auth failed: ruser=...
2020-02-05 07:15:07
45.238.32.151 attack
Scanning random ports - tries to find possible vulnerable services
2020-02-05 06:50:00
178.113.24.200 attackbots
Feb  4 22:10:38 thevastnessof sshd[8208]: Failed password for invalid user zong from 178.113.24.200 port 42144 ssh2
Feb  4 22:29:09 thevastnessof sshd[8382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.113.24.200
...
2020-02-05 06:39:29
183.230.195.63 attackbotsspam
Feb  4 22:37:20 prox sshd[3018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.230.195.63 
Feb  4 22:37:22 prox sshd[3018]: Failed password for invalid user admin from 183.230.195.63 port 56134 ssh2
2020-02-05 06:42:25
60.249.21.132 attackspam
Feb  4 23:40:46 silence02 sshd[509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.249.21.132
Feb  4 23:40:47 silence02 sshd[509]: Failed password for invalid user shree from 60.249.21.132 port 47874 ssh2
Feb  4 23:43:59 silence02 sshd[743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.249.21.132
2020-02-05 06:49:42
2.42.114.2 attackbots
81/tcp
[2020-02-04]1pkt
2020-02-05 07:14:46
49.232.5.122 attackbots
Unauthorized connection attempt detected from IP address 49.232.5.122 to port 2220 [J]
2020-02-05 07:10:06
80.82.77.243 attackspambots
Feb  4 23:39:26 debian-2gb-nbg1-2 kernel: \[3115214.743239\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.82.77.243 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=16248 PROTO=TCP SPT=48117 DPT=25842 WINDOW=1024 RES=0x00 SYN URGP=0
2020-02-05 06:54:37

Recently Reported IPs

113.121.205.190 198.150.66.184 35.200.255.72 83.87.205.156
185.53.91.65 114.221.151.124 87.61.120.104 85.231.107.184
128.138.199.65 217.172.196.124 103.14.96.36 75.28.213.212
69.129.31.88 118.93.108.132 151.205.94.240 31.163.169.157
111.59.180.126 110.183.104.155 35.21.179.232 40.135.25.108