Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.112.247.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16730
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;54.112.247.215.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121703 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 18 11:17:41 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 215.247.112.54.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 215.247.112.54.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
144.172.79.8 attackspam
(sshd) Failed SSH login from 144.172.79.8 (US/United States/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 11 14:15:00 ubnt-55d23 sshd[29598]: Invalid user honey from 144.172.79.8 port 39758
Jun 11 14:15:02 ubnt-55d23 sshd[29598]: Failed password for invalid user honey from 144.172.79.8 port 39758 ssh2
2020-06-11 20:21:08
72.27.26.194 attackbots
Unauthorized connection attempt from IP address 72.27.26.194 on Port 445(SMB)
2020-06-11 20:22:57
115.236.100.114 attack
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-06-11 19:40:12
103.225.221.122 attackbotsspam
2020-06-11T09:54:39+0000 Failed SSH Authentication/Brute Force Attack. (Server 6)
2020-06-11 20:05:59
222.186.15.62 attackspambots
Jun 11 13:40:14 v22018053744266470 sshd[31886]: Failed password for root from 222.186.15.62 port 45924 ssh2
Jun 11 13:40:21 v22018053744266470 sshd[31895]: Failed password for root from 222.186.15.62 port 50637 ssh2
...
2020-06-11 19:45:12
192.141.68.18 attackbotsspam
Jun 11 13:52:08  sshd\[13488\]: Invalid user zhangjingqiu from 192.141.68.18Jun 11 13:52:10  sshd\[13488\]: Failed password for invalid user zhangjingqiu from 192.141.68.18 port 50152 ssh2
...
2020-06-11 20:14:07
106.12.113.204 attack
Jun 11 13:30:56 vps sshd[302231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.113.204
Jun 11 13:30:58 vps sshd[302231]: Failed password for invalid user bee from 106.12.113.204 port 45726 ssh2
Jun 11 13:33:46 vps sshd[311963]: Invalid user xingfeng from 106.12.113.204 port 57042
Jun 11 13:33:46 vps sshd[311963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.113.204
Jun 11 13:33:48 vps sshd[311963]: Failed password for invalid user xingfeng from 106.12.113.204 port 57042 ssh2
...
2020-06-11 19:41:37
218.248.240.125 attackbots
Port Scan detected!
...
2020-06-11 19:42:54
80.216.144.203 attackbots
DATE:2020-06-11 05:48:16, IP:80.216.144.203, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-06-11 19:54:59
80.246.2.153 attackspam
SSH/22 MH Probe, BF, Hack -
2020-06-11 19:45:32
157.230.190.1 attackbots
2020-06-11T05:34:23.815460shield sshd\[14936\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.190.1  user=root
2020-06-11T05:34:26.288572shield sshd\[14936\]: Failed password for root from 157.230.190.1 port 50008 ssh2
2020-06-11T05:37:49.870593shield sshd\[15012\]: Invalid user vsftpd from 157.230.190.1 port 51166
2020-06-11T05:37:49.874545shield sshd\[15012\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.190.1
2020-06-11T05:37:51.961103shield sshd\[15012\]: Failed password for invalid user vsftpd from 157.230.190.1 port 51166 ssh2
2020-06-11 20:10:42
189.186.12.111 attackbotsspam
Jun 11 06:47:18 marvibiene sshd[58799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.186.12.111  user=root
Jun 11 06:47:20 marvibiene sshd[58799]: Failed password for root from 189.186.12.111 port 59483 ssh2
Jun 11 06:52:15 marvibiene sshd[58888]: Invalid user carina from 189.186.12.111 port 37974
...
2020-06-11 20:03:32
140.249.191.91 attackbots
Invalid user chongxuan from 140.249.191.91 port 57350
2020-06-11 19:59:16
1.193.160.164 attackbots
$f2bV_matches
2020-06-11 19:37:52
106.54.236.220 attack
Jun 11 12:49:50 vmi345603 sshd[31062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.236.220
Jun 11 12:49:52 vmi345603 sshd[31062]: Failed password for invalid user vpn from 106.54.236.220 port 38688 ssh2
...
2020-06-11 19:47:27

Recently Reported IPs

152.135.231.170 26.75.29.243 233.116.185.212 170.242.46.180
3.213.176.24 3.40.47.59 199.205.12.42 27.57.206.108
17.177.95.167 100.32.62.43 108.180.224.73 229.72.150.38
140.71.213.158 64.164.77.154 217.61.232.183 103.80.155.8
197.170.166.110 162.228.143.244 51.110.126.72 198.206.108.61