Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 38.19.105.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46354
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;38.19.105.54.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 15:22:45 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 54.105.19.38.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.105.19.38.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.241.16.105 attackbots
[ssh] SSH attack
2019-12-13 21:29:19
213.157.50.108 attackspambots
Unauthorized connection attempt from IP address 213.157.50.108 on Port 445(SMB)
2019-12-13 21:31:05
125.139.88.230 attackbotsspam
RDP Brute-Force (Grieskirchen RZ2)
2019-12-13 21:18:28
106.12.4.109 attackbotsspam
$f2bV_matches
2019-12-13 21:05:36
103.121.195.34 attackspam
Invalid user mcserver from 103.121.195.34 port 42684
2019-12-13 21:19:57
92.242.240.17 attack
Dec 13 13:26:19 h2177944 sshd\[14392\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.242.240.17  user=backup
Dec 13 13:26:21 h2177944 sshd\[14392\]: Failed password for backup from 92.242.240.17 port 51394 ssh2
Dec 13 13:32:45 h2177944 sshd\[14792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.242.240.17  user=ftp
Dec 13 13:32:47 h2177944 sshd\[14792\]: Failed password for ftp from 92.242.240.17 port 59946 ssh2
...
2019-12-13 20:53:41
121.66.224.90 attackspambots
$f2bV_matches
2019-12-13 21:28:28
45.119.215.68 attack
Dec 13 05:21:40 linuxvps sshd\[5677\]: Invalid user focas from 45.119.215.68
Dec 13 05:21:40 linuxvps sshd\[5677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.215.68
Dec 13 05:21:42 linuxvps sshd\[5677\]: Failed password for invalid user focas from 45.119.215.68 port 59708 ssh2
Dec 13 05:29:07 linuxvps sshd\[9955\]: Invalid user netlogon from 45.119.215.68
Dec 13 05:29:07 linuxvps sshd\[9955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.215.68
2019-12-13 20:55:03
80.185.214.123 attack
Dec 13 12:41:06 XXX sshd[32594]: Invalid user postgres from 80.185.214.123 port 37322
2019-12-13 21:11:02
186.53.102.77 attackspam
Fail2Ban Ban Triggered
2019-12-13 21:16:27
106.12.86.193 attackbotsspam
Invalid user temp from 106.12.86.193 port 47728
2019-12-13 21:02:42
171.228.181.84 attackbotsspam
1576223018 - 12/13/2019 08:43:38 Host: 171.228.181.84/171.228.181.84 Port: 445 TCP Blocked
2019-12-13 21:20:16
92.50.151.170 attack
web-1 [ssh] SSH Attack
2019-12-13 21:18:58
117.2.14.50 attack
1576223042 - 12/13/2019 08:44:02 Host: 117.2.14.50/117.2.14.50 Port: 445 TCP Blocked
2019-12-13 20:56:26
106.13.219.171 attackbots
Invalid user backup from 106.13.219.171 port 60560
2019-12-13 21:17:49

Recently Reported IPs

225.188.67.215 13.157.82.254 68.89.31.225 114.184.108.77
157.235.124.115 54.9.189.187 133.28.54.141 84.227.43.117
249.192.219.111 147.135.35.223 127.21.183.171 104.165.27.147
223.242.81.62 117.94.152.75 26.228.251.249 139.205.68.216
42.139.112.181 237.180.57.199 56.109.161.233 211.99.162.124