Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       54.105.0.0 - 54.105.255.255
CIDR:           54.105.0.0/16
NetName:        MERCK2
NetHandle:      NET-54-105-0-0-1
Parent:         NET54 (NET-54-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Merck and Co., Inc. (MERCKA)
RegDate:        1992-03-17
Updated:        2024-12-05
Ref:            https://rdap.arin.net/registry/ip/54.105.0.0


OrgName:        Merck and Co., Inc.
OrgId:          MERCKA
Address:        126 East Lincoln Avenue
City:           Rahway
StateProv:      NJ
PostalCode:     07065
Country:        US
RegDate:        1992-03-17
Updated:        2025-05-06
Ref:            https://rdap.arin.net/registry/entity/MERCKA


OrgTechHandle: WHITE7-ARIN
OrgTechName:   Whitehouse Telecom
OrgTechPhone:  +1-908-423-2900 
OrgTechEmail:  ns_networknoc@merck.com
OrgTechRef:    https://rdap.arin.net/registry/entity/WHITE7-ARIN

OrgAbuseHandle: WHITE7-ARIN
OrgAbuseName:   Whitehouse Telecom
OrgAbusePhone:  +1-908-423-2900 
OrgAbuseEmail:  ns_networknoc@merck.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/WHITE7-ARIN

OrgNOCHandle: WHITE7-ARIN
OrgNOCName:   Whitehouse Telecom
OrgNOCPhone:  +1-908-423-2900 
OrgNOCEmail:  ns_networknoc@merck.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/WHITE7-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.105.246.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22783
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;54.105.246.56.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041201 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 13 14:44:22 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 56.246.105.54.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 56.246.105.54.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
46.101.164.27 attackspambots
SSH login attempts.
2020-08-22 23:08:48
218.92.0.251 attackspambots
Aug 22 16:41:01 cosmoit sshd[27863]: Failed password for root from 218.92.0.251 port 61454 ssh2
2020-08-22 22:43:52
47.59.63.234 attackspambots
SSH login attempts.
2020-08-22 22:45:16
114.182.25.213 attack
Aug 22 16:33:57 electroncash sshd[4422]: Invalid user max from 114.182.25.213 port 61439
Aug 22 16:33:57 electroncash sshd[4422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.182.25.213 
Aug 22 16:33:57 electroncash sshd[4422]: Invalid user max from 114.182.25.213 port 61439
Aug 22 16:33:59 electroncash sshd[4422]: Failed password for invalid user max from 114.182.25.213 port 61439 ssh2
Aug 22 16:37:55 electroncash sshd[5478]: Invalid user eduardo from 114.182.25.213 port 62955
...
2020-08-22 22:42:21
134.209.97.42 attackspambots
Aug 22 14:50:41 ajax sshd[21180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.97.42 
Aug 22 14:50:43 ajax sshd[21180]: Failed password for invalid user police from 134.209.97.42 port 34394 ssh2
2020-08-22 22:46:03
162.142.125.57 attackbots
port scan and connect, tcp 9200 (elasticsearch)
2020-08-22 22:41:29
111.93.175.214 attackbotsspam
SSH Brute-Forcing (server1)
2020-08-22 22:51:13
31.129.132.198 attack
Aug 22 14:13:55 db sshd[17436]: Invalid user Administrator from 31.129.132.198 port 53614
...
2020-08-22 22:53:06
108.59.8.80 attackbots
Web bot scraping website [bot:mj12bot]
2020-08-22 22:34:14
180.76.109.16 attackspam
Aug 22 16:56:16 vps333114 sshd[8615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.109.16
Aug 22 16:56:18 vps333114 sshd[8615]: Failed password for invalid user ftpadmin from 180.76.109.16 port 38952 ssh2
...
2020-08-22 22:51:00
46.101.137.182 attackspambots
invalid login attempt (oracle)
2020-08-22 22:28:18
46.166.198.75 attackbotsspam
SSH login attempts.
2020-08-22 22:54:45
106.54.128.79 attackbotsspam
Brute force attempt
2020-08-22 22:54:20
46.101.4.101 attackspam
SSH login attempts.
2020-08-22 23:00:08
183.111.96.20 attack
2020-08-22T14:30:59.922504shield sshd\[11581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.96.20  user=root
2020-08-22T14:31:01.846186shield sshd\[11581\]: Failed password for root from 183.111.96.20 port 57806 ssh2
2020-08-22T14:35:11.773084shield sshd\[12550\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.96.20  user=root
2020-08-22T14:35:13.951913shield sshd\[12550\]: Failed password for root from 183.111.96.20 port 58874 ssh2
2020-08-22T14:39:31.225079shield sshd\[13519\]: Invalid user firewall from 183.111.96.20 port 60754
2020-08-22T14:39:31.231607shield sshd\[13519\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.96.20
2020-08-22 22:43:17

Recently Reported IPs

208.80.248.225 91.65.186.135 31.77.102.54 2606:4700:10::ac43:2019
2606:4700:10::6814:7032 2606:4700:10::ac43:1569 2606:4700:10::6814:5172 2606:4700:10::6814:4900
2606:4700:10::ac43:2724 51.103.43.80 2606:4700:10::ac43:1352 2606:4700:10::6816:2311
2606:4700:10::6814:9453 43.129.247.237 172.232.209.215 35.195.84.127
34.95.249.32 161.35.175.50 2606:4700:10::6816:2158 2606:4700:10::6814:4446