Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.148.14.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16162
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;54.148.14.213.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 128 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 04:53:51 CST 2025
;; MSG SIZE  rcvd: 106
Host info
213.14.148.54.in-addr.arpa domain name pointer ec2-54-148-14-213.us-west-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
213.14.148.54.in-addr.arpa	name = ec2-54-148-14-213.us-west-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
201.174.46.234 attackspambots
Sep 11 14:04:40 MK-Soft-VM4 sshd\[7396\]: Invalid user postgres from 201.174.46.234 port 55642
Sep 11 14:04:40 MK-Soft-VM4 sshd\[7396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.174.46.234
Sep 11 14:04:42 MK-Soft-VM4 sshd\[7396\]: Failed password for invalid user postgres from 201.174.46.234 port 55642 ssh2
...
2019-09-11 22:12:37
37.187.5.137 attackbotsspam
2019-09-11T08:57:29.330771abusebot.cloudsearch.cf sshd\[1432\]: Invalid user 123321 from 37.187.5.137 port 33578
2019-09-11 21:33:16
139.159.27.62 attackbots
Sep 11 07:51:48 work-partkepr sshd\[25307\]: Invalid user tester from 139.159.27.62 port 42938
Sep 11 07:51:48 work-partkepr sshd\[25307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.159.27.62
...
2019-09-11 21:35:01
88.247.110.88 attackspambots
$f2bV_matches
2019-09-11 21:28:17
218.98.40.134 attackbots
Sep 11 09:37:11 ny01 sshd[29949]: Failed password for root from 218.98.40.134 port 38365 ssh2
Sep 11 09:37:13 ny01 sshd[29953]: Failed password for root from 218.98.40.134 port 42040 ssh2
Sep 11 09:37:14 ny01 sshd[29949]: Failed password for root from 218.98.40.134 port 38365 ssh2
2019-09-11 21:49:22
211.114.176.34 attackspambots
2019-09-11T12:12:20.326631abusebot-2.cloudsearch.cf sshd\[25931\]: Invalid user daniel from 211.114.176.34 port 51326
2019-09-11 21:59:49
190.123.16.38 attackbots
2019-09-11T21:14:59.125369enmeeting.mahidol.ac.th sshd\[2840\]: Invalid user student1 from 190.123.16.38 port 46614
2019-09-11T21:14:59.144085enmeeting.mahidol.ac.th sshd\[2840\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=sscs-sxm-fw01.cust.davosys.net
2019-09-11T21:15:01.083313enmeeting.mahidol.ac.th sshd\[2840\]: Failed password for invalid user student1 from 190.123.16.38 port 46614 ssh2
...
2019-09-11 22:19:33
124.121.125.25 attack
Automatic report - Port Scan Attack
2019-09-11 21:56:17
150.95.52.111 attackspambots
150.95.52.111 - - [11/Sep/2019:09:51:43 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
150.95.52.111 - - [11/Sep/2019:09:51:44 +0200] "POST /wp-login.php HTTP/1.1" 200 1503 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
150.95.52.111 - - [11/Sep/2019:09:51:45 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
150.95.52.111 - - [11/Sep/2019:09:51:46 +0200] "POST /wp-login.php HTTP/1.1" 200 1489 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
150.95.52.111 - - [11/Sep/2019:09:51:46 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
150.95.52.111 - - [11/Sep/2019:09:51:47 +0200] "POST /wp-login.php HTTP/1.1" 200 1491 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-09-11 21:32:29
5.249.144.206 attack
Sep 11 11:56:05 icinga sshd[12132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.249.144.206
Sep 11 11:56:07 icinga sshd[12132]: Failed password for invalid user bot2 from 5.249.144.206 port 36948 ssh2
...
2019-09-11 21:33:48
103.91.210.33 attack
Sep 11 11:10:29 vpn01 sshd\[4186\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.91.210.33  user=root
Sep 11 11:10:31 vpn01 sshd\[4186\]: Failed password for root from 103.91.210.33 port 4720 ssh2
Sep 11 11:10:43 vpn01 sshd\[4188\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.91.210.33  user=root
2019-09-11 21:31:35
106.12.27.205 attackspambots
Sep 11 10:20:58 ny01 sshd[5988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.27.205
Sep 11 10:20:59 ny01 sshd[5988]: Failed password for invalid user nagiospass from 106.12.27.205 port 35628 ssh2
Sep 11 10:26:50 ny01 sshd[7362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.27.205
2019-09-11 22:26:53
162.241.193.116 attackspam
Sep 11 04:01:43 hiderm sshd\[1689\]: Invalid user q1w2e3r4t5y6 from 162.241.193.116
Sep 11 04:01:43 hiderm sshd\[1689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.193.116
Sep 11 04:01:46 hiderm sshd\[1689\]: Failed password for invalid user q1w2e3r4t5y6 from 162.241.193.116 port 38566 ssh2
Sep 11 04:09:12 hiderm sshd\[2425\]: Invalid user 12345 from 162.241.193.116
Sep 11 04:09:12 hiderm sshd\[2425\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.193.116
2019-09-11 22:16:52
128.77.29.135 attack
Sep 11 15:06:03 nextcloud sshd\[22260\]: Invalid user git from 128.77.29.135
Sep 11 15:06:03 nextcloud sshd\[22260\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.77.29.135
Sep 11 15:06:05 nextcloud sshd\[22260\]: Failed password for invalid user git from 128.77.29.135 port 45022 ssh2
...
2019-09-11 21:27:42
80.85.152.187 attackbotsspam
Spam-Mail 10 Sep 2019 22:52 Received: from mail.formags.art ([80.85.152.187])
2019-09-11 21:31:55

Recently Reported IPs

192.187.93.21 81.134.2.74 246.65.224.48 61.204.197.226
64.46.123.126 131.183.226.100 95.177.85.154 170.99.138.7
150.139.211.130 243.108.201.58 217.165.209.240 94.128.17.113
86.152.112.135 88.188.157.189 75.207.45.234 133.211.47.87
33.186.155.20 147.203.85.74 191.73.157.250 164.22.32.40