Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Boardman

Region: Oregon

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.148.156.247
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23265
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;54.148.156.247.			IN	A

;; AUTHORITY SECTION:
.			349	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019122800 1800 900 604800 86400

;; Query time: 112 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 29 03:46:29 CST 2019
;; MSG SIZE  rcvd: 118
Host info
247.156.148.54.in-addr.arpa domain name pointer ec2-54-148-156-247.us-west-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
247.156.148.54.in-addr.arpa	name = ec2-54-148-156-247.us-west-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
92.222.79.7 attackspam
leo_www
2019-07-17 16:37:45
134.73.129.161 attackspam
2019-07-16T21:52:32.772141m3.viererban.de sshd[31918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.73.129.161
2019-07-16T21:52:34.890084m3.viererban.de sshd[31918]: Failed password for invalid user www from 134.73.129.161 port 34688 ssh2
2019-07-17T07:43:10.378893m3.viererban.de sshd[5449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.73.129.161
2019-07-17T07:43:11.848804m3.viererban.de sshd[5449]: Failed password for invalid user cod4server from 134.73.129.161 port 59018 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=134.73.129.161
2019-07-17 17:15:48
116.74.123.28 attack
firewall-block, port(s): 23/tcp
2019-07-17 16:52:03
170.210.214.50 attackspambots
Jul 17 10:41:16 localhost sshd\[20246\]: Invalid user zhou from 170.210.214.50 port 55502
Jul 17 10:41:16 localhost sshd\[20246\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.210.214.50
Jul 17 10:41:18 localhost sshd\[20246\]: Failed password for invalid user zhou from 170.210.214.50 port 55502 ssh2
2019-07-17 17:05:51
70.24.197.243 attackspam
2019-07-17T08:09:24.256435lon01.zurich-datacenter.net sshd\[20997\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=qubcpq0634w-lp130-04-70-24-197-243.dsl.bell.ca  user=root
2019-07-17T08:09:25.957122lon01.zurich-datacenter.net sshd\[20997\]: Failed password for root from 70.24.197.243 port 42132 ssh2
2019-07-17T08:09:27.869852lon01.zurich-datacenter.net sshd\[20997\]: Failed password for root from 70.24.197.243 port 42132 ssh2
2019-07-17T08:09:30.255345lon01.zurich-datacenter.net sshd\[20997\]: Failed password for root from 70.24.197.243 port 42132 ssh2
2019-07-17T08:09:32.384392lon01.zurich-datacenter.net sshd\[20997\]: Failed password for root from 70.24.197.243 port 42132 ssh2
...
2019-07-17 17:19:12
176.31.191.61 attackspambots
Jul 17 10:24:25 SilenceServices sshd[2338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.191.61
Jul 17 10:24:27 SilenceServices sshd[2338]: Failed password for invalid user emil from 176.31.191.61 port 50780 ssh2
Jul 17 10:29:03 SilenceServices sshd[5351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.191.61
2019-07-17 16:51:42
66.70.130.155 attackbotsspam
Jul 17 04:15:26 TORMINT sshd\[32030\]: Invalid user test from 66.70.130.155
Jul 17 04:15:26 TORMINT sshd\[32030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.130.155
Jul 17 04:15:27 TORMINT sshd\[32030\]: Failed password for invalid user test from 66.70.130.155 port 36012 ssh2
...
2019-07-17 16:34:59
122.252.231.254 attackspambots
TCP port 445 (SMB) attempt blocked by firewall. [2019-07-17 08:08:39]
2019-07-17 17:11:44
14.226.84.241 attackbotsspam
TCP port 445 (SMB) attempt blocked by firewall. [2019-07-17 08:09:18]
2019-07-17 16:42:46
51.75.207.61 attackbotsspam
Jul 17 04:59:38 plusreed sshd[1599]: Invalid user beauty from 51.75.207.61
...
2019-07-17 17:10:55
140.143.69.34 attackbots
Jul 17 11:18:36 yabzik sshd[26848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.69.34
Jul 17 11:18:38 yabzik sshd[26848]: Failed password for invalid user vivo from 140.143.69.34 port 60273 ssh2
Jul 17 11:22:04 yabzik sshd[27957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.69.34
2019-07-17 16:34:19
185.176.26.104 attackspam
41258/tcp 42585/tcp 42464/tcp...
[2019-06-14/07-17]3022pkt,584pt.(tcp)
2019-07-17 16:43:20
197.47.23.49 attackspambots
2019-07-17 x@x
2019-07-17 x@x
2019-07-17 x@x
2019-07-17 x@x
2019-07-17 08:39:04 dovecot_plain authenticator failed for (AmineBAHI) [197.47.23.49]:36254: 535 Incorrect authentication data (set_id=veter)
2019-07-17 08:39:10 dovecot_login authenticator failed for (AmineBAHI) [197.47.23.49]:36254: 535 Incorrect authentication data (set_id=veter)
2019-07-17 08:39:17 dovecot_plain authenticator failed for (AmineBAHI) [197.47.23.49]:37359: 535 Incorrect authentication data (set_id=veter)
2019-07-17 08:39:19 dovecot_login authenticator failed for (AmineBAHI) [197.47.23.49]:37359: 535 Incorrect authentication data (set_id=veter)
2019-07-17 x@x
2019-07-17 x@x
2019-07-17 x@x
2019-07-17 x@x
2019-07-17 08:39:31 dovecot_plain authenticator failed for (AmineBAHI) [197.47.23.49]:39440: 535 Incorrect authentication data (set_id=veter)
2019-07-17 08:39:33 dovecot_login authenticator failed for (AmineBAHI) [197.47.23.49]:39440: 535 Incorrect authentication data (set_id=veter)
2019-07-17 08........
------------------------------
2019-07-17 17:06:20
139.59.56.121 attackbots
Jul 17 10:34:43 srv206 sshd[7581]: Invalid user zebra from 139.59.56.121
Jul 17 10:34:43 srv206 sshd[7581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.56.121
Jul 17 10:34:43 srv206 sshd[7581]: Invalid user zebra from 139.59.56.121
Jul 17 10:34:44 srv206 sshd[7581]: Failed password for invalid user zebra from 139.59.56.121 port 39112 ssh2
...
2019-07-17 16:46:35
122.224.203.228 attack
Jul 17 11:16:14 srv-4 sshd\[16253\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.224.203.228  user=root
Jul 17 11:16:16 srv-4 sshd\[16253\]: Failed password for root from 122.224.203.228 port 58642 ssh2
Jul 17 11:19:41 srv-4 sshd\[16665\]: Invalid user xavier from 122.224.203.228
...
2019-07-17 16:56:56

Recently Reported IPs

210.250.98.242 103.21.240.229 168.121.96.65 91.38.164.173
106.15.149.116 165.22.163.227 78.114.108.98 225.46.220.254
208.37.228.184 154.128.79.188 72.64.231.217 121.124.206.66
46.144.206.162 114.251.216.146 110.184.196.171 129.252.99.80
150.201.120.139 205.124.20.227 92.112.53.30 93.250.132.69