Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ashburn

Region: Virginia

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Amazon.com, Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.164.222.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36280
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;54.164.222.129.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051100 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat May 11 20:03:26 CST 2019
;; MSG SIZE  rcvd: 118

Host info
129.222.164.54.in-addr.arpa domain name pointer ec2-54-164-222-129.compute-1.amazonaws.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
129.222.164.54.in-addr.arpa	name = ec2-54-164-222-129.compute-1.amazonaws.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
62.234.6.147 attack
2020-10-09T14:59:27.245175cyberdyne sshd[1724490]: Invalid user job from 62.234.6.147 port 55008
2020-10-09T14:59:27.250935cyberdyne sshd[1724490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.6.147
2020-10-09T14:59:27.245175cyberdyne sshd[1724490]: Invalid user job from 62.234.6.147 port 55008
2020-10-09T14:59:29.208263cyberdyne sshd[1724490]: Failed password for invalid user job from 62.234.6.147 port 55008 ssh2
...
2020-10-10 03:55:26
122.51.194.44 attack
2020-10-09T21:12:50.561071ks3355764 sshd[15544]: Invalid user web from 122.51.194.44 port 52248
2020-10-09T21:12:52.740722ks3355764 sshd[15544]: Failed password for invalid user web from 122.51.194.44 port 52248 ssh2
...
2020-10-10 04:11:20
151.61.254.205 attackbotsspam
Icarus honeypot on github
2020-10-10 03:41:53
23.247.5.197 attackspambots
{Attempting port 25. Deferred}

Received: by unixhost (Postfix)N7  Thu,  8 Oct 2020 16:36:42 -0400 (EDT)N# Delivered-To: support@o########g.comN; s=dkim; 
 i=wayne.powell@swinductork.top;N! bh=lL93pg
2020-10-10 04:12:13
92.62.131.106 attack
Oct  9 22:03:08 ip106 sshd[27627]: Failed password for root from 92.62.131.106 port 35399 ssh2
...
2020-10-10 04:11:34
112.85.42.196 attackspam
(sshd) Failed SSH login from 112.85.42.196 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  9 15:43:11 optimus sshd[17647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.196  user=root
Oct  9 15:43:11 optimus sshd[17655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.196  user=root
Oct  9 15:43:11 optimus sshd[17651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.196  user=root
Oct  9 15:43:11 optimus sshd[17657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.196  user=root
Oct  9 15:43:11 optimus sshd[17652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.196  user=root
2020-10-10 03:43:31
116.105.74.246 attackspam
Oct  8 20:36:00 netserv300 sshd[6800]: Connection from 116.105.74.246 port 62247 on 178.63.236.16 port 22
Oct  8 20:36:00 netserv300 sshd[6802]: Connection from 116.105.74.246 port 62281 on 178.63.236.20 port 22
Oct  8 20:36:00 netserv300 sshd[6803]: Connection from 116.105.74.246 port 62276 on 178.63.236.17 port 22
Oct  8 20:36:00 netserv300 sshd[6804]: Connection from 116.105.74.246 port 62278 on 178.63.236.19 port 22
Oct  8 20:36:00 netserv300 sshd[6808]: Connection from 116.105.74.246 port 62331 on 178.63.236.21 port 22
Oct  8 20:36:02 netserv300 sshd[6802]: Invalid user guest from 116.105.74.246 port 62281
Oct  8 20:36:02 netserv300 sshd[6800]: Invalid user guest from 116.105.74.246 port 62247
Oct  8 20:36:02 netserv300 sshd[6803]: Invalid user guest from 116.105.74.246 port 62276
Oct  8 20:36:02 netserv300 sshd[6804]: Invalid user guest from 116.105.74.246 port 62278
Oct  8 20:36:02 netserv300 sshd[6808]: Invalid user guest from 116.105.74.246 port 62331


........
--------------------------------------
2020-10-10 04:14:17
212.70.149.36 attackspambots
2020-10-09 22:46:49 auth_plain authenticator failed for (User) [212.70.149.36]: 535 Incorrect authentication data (set_id=mtb@lavrinenko.info)
2020-10-09 22:47:09 auth_plain authenticator failed for (User) [212.70.149.36]: 535 Incorrect authentication data (set_id=aw@lavrinenko.info)
...
2020-10-10 03:51:49
122.51.134.202 attackbotsspam
prod8
...
2020-10-10 03:56:51
162.0.251.72 attackbotsspam
ang 162.0.251.72 [09/Oct/2020:02:44:45 "-" "POST /xmlrpc.php 200 557
162.0.251.72 [09/Oct/2020:04:47:27 "-" "POST /xmlrpc.php 200 457
162.0.251.72 [09/Oct/2020:08:19:52 "-" "POST /xmlrpc.php 200 523
2020-10-10 04:12:25
74.207.129.51 attackspam
Brute forcing email accounts
2020-10-10 03:44:52
178.128.243.225 attackbots
Invalid user user from 178.128.243.225 port 38820
2020-10-10 04:03:30
164.90.210.8 attackbots
Oct  9 06:34:55 propaganda sshd[81369]: Connection from 164.90.210.8 port 49006 on 10.0.0.161 port 22 rdomain ""
Oct  9 06:34:55 propaganda sshd[81369]: Connection closed by 164.90.210.8 port 49006 [preauth]
2020-10-10 03:49:58
58.33.84.251 attackspam
Oct  9 08:50:13 vps46666688 sshd[15222]: Failed password for root from 58.33.84.251 port 63015 ssh2
...
2020-10-10 03:42:24
31.173.168.226 attack
31.173.168.226 (RU/Russia/-), 3 distributed sshd attacks on account [pi] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Oct  9 15:40:28 internal2 sshd[23376]: Invalid user pi from 31.173.168.226 port 46786
Oct  9 15:40:28 internal2 sshd[23374]: Invalid user pi from 31.173.168.226 port 46782
Oct  9 15:43:13 internal2 sshd[24557]: Invalid user pi from 176.8.83.234 port 51724

IP Addresses Blocked:
2020-10-10 03:45:15

Recently Reported IPs

117.80.188.117 162.243.201.144 179.138.90.3 88.210.210.136
165.122.61.181 176.62.75.36 195.88.154.21 62.144.150.187
180.189.17.181 85.214.247.251 89.31.5.8 49.242.142.43
49.76.144.68 12.167.72.109 69.12.88.72 172.86.248.96
4.231.104.121 185.27.38.71 215.72.39.253 112.51.112.111