Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Woodbridge

Region: New Jersey

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.109.161.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53379
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;54.109.161.129.			IN	A

;; AUTHORITY SECTION:
.			534	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020030200 1800 900 604800 86400

;; Query time: 79 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 03 00:16:07 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 129.161.109.54.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 129.161.109.54.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
213.149.51.238 attackbots
1583328860 - 03/04/2020 14:34:20 Host: 213.149.51.238/213.149.51.238 Port: 445 TCP Blocked
2020-03-05 02:24:58
125.215.207.40 attack
Mar  4 21:28:30 gw1 sshd[18143]: Failed password for smmsp from 125.215.207.40 port 33186 ssh2
...
2020-03-05 02:12:48
201.134.41.35 attackspam
suspicious action Wed, 04 Mar 2020 10:34:48 -0300
2020-03-05 01:50:27
176.40.245.234 attack
kp-sea2-01 recorded 2 login violations from 176.40.245.234 and was blocked at 2020-03-04 13:34:20. 176.40.245.234 has been blocked on 0 previous occasions. 176.40.245.234's first attempt was recorded at 2020-03-04 13:34:20
2020-03-05 02:21:31
84.39.112.83 attack
(From tara.dragon@datacomm.ch) Whаt's the  most сonvеniеnt wау to  gаin $83764 а mоnth: http://ijcavsgot.justinlist.org/8ad9bf8638
2020-03-05 02:00:25
109.123.117.230 attackbots
Port probing on unauthorized port 389
2020-03-05 02:02:08
213.212.255.140 attackbots
frenzy
2020-03-05 02:07:32
92.63.194.32 attack
(sshd) Failed SSH login from 92.63.194.32 (NL/Netherlands/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar  4 19:14:52 ubnt-55d23 sshd[20890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.32  user=root
Mar  4 19:14:53 ubnt-55d23 sshd[20890]: Failed password for root from 92.63.194.32 port 40823 ssh2
2020-03-05 02:28:41
219.91.20.87 attack
$f2bV_matches
2020-03-05 02:24:24
71.246.210.34 attack
$f2bV_matches
2020-03-05 01:51:19
218.92.0.212 attackspam
Mar  4 07:41:35 web9 sshd\[8021\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.212  user=root
Mar  4 07:41:37 web9 sshd\[8021\]: Failed password for root from 218.92.0.212 port 34188 ssh2
Mar  4 07:41:40 web9 sshd\[8021\]: Failed password for root from 218.92.0.212 port 34188 ssh2
Mar  4 07:41:43 web9 sshd\[8021\]: Failed password for root from 218.92.0.212 port 34188 ssh2
Mar  4 07:41:54 web9 sshd\[8067\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.212  user=root
2020-03-05 01:52:07
39.33.165.211 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-05 02:31:37
219.92.16.81 attackspambots
$f2bV_matches
2020-03-05 02:18:50
101.224.56.20 attackspambots
Automatic report - Port Scan Attack
2020-03-05 02:15:14
219.84.203.57 attack
$f2bV_matches
2020-03-05 02:33:00

Recently Reported IPs

164.216.14.10 73.137.156.109 66.67.189.234 171.126.245.46
115.119.92.88 130.218.4.86 171.83.85.202 12.97.77.64
67.63.76.207 105.51.15.105 166.60.229.218 161.108.196.75
135.199.72.107 126.32.196.130 15.45.238.87 197.227.251.78
61.220.251.205 69.150.195.194 45.113.70.37 31.105.136.184