Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Boardman

Region: Oregon

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.189.49.120
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47059
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;54.189.49.120.			IN	A

;; AUTHORITY SECTION:
.			211	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020062401 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 25 07:18:52 CST 2020
;; MSG SIZE  rcvd: 117
Host info
120.49.189.54.in-addr.arpa domain name pointer ec2-54-189-49-120.us-west-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
120.49.189.54.in-addr.arpa	name = ec2-54-189-49-120.us-west-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
5.188.210.46 botsattackproxy
[portscan] proxy check
2020-12-31 13:15:27
10.174.32.116 attack
3 times try logging on my adress !!!!!!!!!!!!!!!!!! - hacking"s !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
2021-01-09 22:18:19
78.41.102.178 attack
Brute-Force
2021-01-03 20:43:46
195.62.32.179 spamattack
PHISHING ATTACK
Magical Sandals : 
"Wear these Sandals and pain is gone.":
from [195.62.32.179] (port=33498 helo=ping.shinehead.bid):
Sat, 26 Dec 2020 22:49:08 +1100
2020-12-27 06:17:27
76.125.38.129 attacknormal
Gf
2021-01-05 18:42:04
51.161.14.102 attack
my malware program blocks this ip trying to connect or scan port 3389
2020-12-29 16:08:14
51.79.29.55 spamattack
Website attack, scanning for username and passwd
2021-01-04 16:30:38
195.62.32.23 spamattack
PHISHING ATTACK
Transparent Face Visor - ClearShield@sugartonic.icu : 
"Wear the Mouth Visor and smile freely!" :
from [195.62.32.23] (port=55637 helo=nate.sugartonic.icu)  :
Thu, 31 Dec 2020 00:28:31 +1100
2020-12-31 06:27:19
45.146.122.151 spamattackproxynormal
This shows up on my fb as logged in on my 2 accounts. This one and a couple more
2021-01-10 10:52:00
194.150.215.242 spam
SPAM, like Email Spam, Web Spam, etc.
2021-01-01 21:51:53
185.63.253.200 spamattackproxynormal
Kiki
2021-01-05 23:14:17
49.51.160.77 spamattack
port 6003
2020-12-31 13:09:30
47.247.73.183 attack
Ljkjhhhjjbg
2021-01-07 13:40:49
185.63.253.200 attack
Iya
2021-01-04 02:07:41
154.28.188.220 attack
Tried to access QNAP NAS under admin account.
Recommendation: Block IP permanently; at least use 2 difficult password and 2 factor auth; is possible (normally yes) create admin account with different name and then disable default admin account
2020-12-31 20:01:55

Recently Reported IPs

100.242.125.45 116.106.80.50 79.172.196.234 68.146.201.244
100.215.31.104 85.148.63.139 13.237.226.10 5.76.190.52
196.146.36.108 200.26.132.25 239.177.117.254 61.167.79.203
85.44.28.231 110.232.184.134 227.211.10.238 2600:9000:20a6:e400:10:ab99:6600:21
60.97.201.80 193.200.108.39 203.43.206.143 205.238.229.17