Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.149.48.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51440
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;54.149.48.19.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 15:10:14 CST 2022
;; MSG SIZE  rcvd: 105
Host info
19.48.149.54.in-addr.arpa domain name pointer ec2-54-149-48-19.us-west-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
19.48.149.54.in-addr.arpa	name = ec2-54-149-48-19.us-west-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
58.248.0.197 attackspam
Jun  4 21:51:57 master sshd[9272]: Failed password for root from 58.248.0.197 port 34002 ssh2
Jun  4 21:56:50 master sshd[9276]: Failed password for root from 58.248.0.197 port 58546 ssh2
Jun  4 21:57:51 master sshd[9278]: Failed password for root from 58.248.0.197 port 38930 ssh2
Jun  4 21:58:51 master sshd[9280]: Failed password for root from 58.248.0.197 port 47544 ssh2
Jun  4 21:59:43 master sshd[9282]: Failed password for root from 58.248.0.197 port 56160 ssh2
Jun  4 22:00:37 master sshd[9696]: Failed password for root from 58.248.0.197 port 36544 ssh2
Jun  4 22:01:29 master sshd[9698]: Failed password for root from 58.248.0.197 port 45158 ssh2
Jun  4 22:02:22 master sshd[9700]: Failed password for root from 58.248.0.197 port 53774 ssh2
Jun  4 22:03:14 master sshd[9704]: Failed password for root from 58.248.0.197 port 34156 ssh2
Jun  4 22:04:06 master sshd[9706]: Failed password for root from 58.248.0.197 port 42772 ssh2
2020-06-05 06:02:25
117.50.109.24 attack
Brute-force attempt banned
2020-06-05 06:29:09
203.86.7.110 attack
Jun  4 22:11:17 ns382633 sshd\[18318\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.86.7.110  user=root
Jun  4 22:11:19 ns382633 sshd\[18318\]: Failed password for root from 203.86.7.110 port 36473 ssh2
Jun  4 22:20:04 ns382633 sshd\[19478\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.86.7.110  user=root
Jun  4 22:20:06 ns382633 sshd\[19478\]: Failed password for root from 203.86.7.110 port 51847 ssh2
Jun  4 22:22:25 ns382633 sshd\[20065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.86.7.110  user=root
2020-06-05 06:08:36
83.228.50.141 attack
$f2bV_matches
2020-06-05 06:25:25
87.27.143.210 attackspam
DATE:2020-06-04 22:22:33, IP:87.27.143.210, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-06-05 06:02:06
36.133.38.45 attackbots
Jun  4 22:02:56 mail sshd[16162]: Failed password for root from 36.133.38.45 port 38430 ssh2
...
2020-06-05 05:56:23
212.156.64.10 attackspam
LGS,WP GET /store/wp-includes/wlwmanifest.xml
2020-06-05 06:05:18
222.186.175.148 attack
Jun  4 23:57:22 pve1 sshd[23512]: Failed password for root from 222.186.175.148 port 35728 ssh2
Jun  4 23:57:28 pve1 sshd[23512]: Failed password for root from 222.186.175.148 port 35728 ssh2
...
2020-06-05 05:58:38
107.170.57.221 attackspambots
Jun  5 00:01:57 home sshd[19298]: Failed password for root from 107.170.57.221 port 58597 ssh2
Jun  5 00:06:17 home sshd[19764]: Failed password for root from 107.170.57.221 port 42186 ssh2
...
2020-06-05 06:19:34
193.148.70.253 attackspam
SASL PLAIN auth failed: ruser=...
2020-06-05 06:23:10
170.78.240.158 attack
Jun  4 22:40:01 master sshd[10431]: Failed password for invalid user admin from 170.78.240.158 port 39667 ssh2
2020-06-05 05:53:23
194.219.200.219 attackspambots
Wordpress login attempts
2020-06-05 06:10:44
222.186.175.169 attack
2020-06-04T22:08:29.621651shield sshd\[17276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
2020-06-04T22:08:31.609757shield sshd\[17276\]: Failed password for root from 222.186.175.169 port 57850 ssh2
2020-06-04T22:08:35.234416shield sshd\[17276\]: Failed password for root from 222.186.175.169 port 57850 ssh2
2020-06-04T22:08:38.742870shield sshd\[17276\]: Failed password for root from 222.186.175.169 port 57850 ssh2
2020-06-04T22:08:41.995617shield sshd\[17276\]: Failed password for root from 222.186.175.169 port 57850 ssh2
2020-06-05 06:14:04
218.92.0.175 attack
Jun  5 00:01:44 vmi345603 sshd[12711]: Failed password for root from 218.92.0.175 port 19738 ssh2
Jun  5 00:01:53 vmi345603 sshd[12711]: Failed password for root from 218.92.0.175 port 19738 ssh2
...
2020-06-05 06:21:42
175.125.95.160 attack
Jun  4 23:14:52 localhost sshd\[22087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.125.95.160  user=root
Jun  4 23:14:53 localhost sshd\[22087\]: Failed password for root from 175.125.95.160 port 43966 ssh2
Jun  4 23:18:51 localhost sshd\[22745\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.125.95.160  user=root
Jun  4 23:18:53 localhost sshd\[22745\]: Failed password for root from 175.125.95.160 port 46958 ssh2
Jun  4 23:22:49 localhost sshd\[22960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.125.95.160  user=root
...
2020-06-05 06:28:53

Recently Reported IPs

202.51.191.174 125.84.236.76 131.196.135.7 125.84.237.206
27.71.108.183 8.210.33.132 120.137.157.101 115.61.119.251
110.232.95.218 125.16.111.194 173.44.166.75 20.119.207.111
112.12.167.138 43.231.76.29 177.25.149.171 45.160.138.158
126.200.251.235 138.197.111.192 188.226.4.14 45.201.206.14