Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.198.129.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32889
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;54.198.129.122.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 16:47:02 CST 2025
;; MSG SIZE  rcvd: 107
Host info
122.129.198.54.in-addr.arpa domain name pointer ec2-54-198-129-122.compute-1.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
122.129.198.54.in-addr.arpa	name = ec2-54-198-129-122.compute-1.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.51.113.15 attackbotsspam
71. On May 24 2020 experienced a Brute Force SSH login attempt -> 1 unique times by 106.51.113.15.
2020-05-25 06:06:34
188.142.145.179 attackspambots
firewall-block, port(s): 80/tcp
2020-05-25 06:37:54
123.24.218.148 attack
Unauthorized connection attempt from IP address 123.24.218.148 on Port 445(SMB)
2020-05-25 06:30:37
113.204.205.66 attack
May 24 18:04:22 NPSTNNYC01T sshd[6144]: Failed password for root from 113.204.205.66 port 7244 ssh2
May 24 18:07:49 NPSTNNYC01T sshd[6373]: Failed password for root from 113.204.205.66 port 47861 ssh2
...
2020-05-25 06:15:35
122.225.203.162 attackbots
fail2ban -- 122.225.203.162
...
2020-05-25 06:33:46
41.170.14.93 attackspam
2020-05-24T23:15:14.090820mail.broermann.family sshd[20926]: Invalid user jarvis from 41.170.14.93 port 56866
2020-05-24T23:15:14.096179mail.broermann.family sshd[20926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.170.14.93
2020-05-24T23:15:14.090820mail.broermann.family sshd[20926]: Invalid user jarvis from 41.170.14.93 port 56866
2020-05-24T23:15:16.100846mail.broermann.family sshd[20926]: Failed password for invalid user jarvis from 41.170.14.93 port 56866 ssh2
2020-05-24T23:18:35.538121mail.broermann.family sshd[21026]: Invalid user user from 41.170.14.93 port 34722
...
2020-05-25 06:32:31
189.182.233.124 attackbots
Unauthorised access (May 24) SRC=189.182.233.124 LEN=40 TTL=237 ID=65222 TCP DPT=1433 WINDOW=1024 SYN
2020-05-25 06:24:27
109.191.88.210 attack
[portscan] Port scan
2020-05-25 06:37:12
139.198.191.217 attack
May 24 12:15:52 : SSH login attempts with invalid user
2020-05-25 06:12:18
123.206.7.96 attackspam
May 24 22:30:31 mail sshd[15871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.7.96  user=root
May 24 22:30:33 mail sshd[15871]: Failed password for root from 123.206.7.96 port 59292 ssh2
...
2020-05-25 06:21:00
122.152.208.61 attackspambots
SSH Bruteforce on Honeypot
2020-05-25 06:15:05
112.72.98.70 attackspam
Unauthorized connection attempt from IP address 112.72.98.70 on Port 445(SMB)
2020-05-25 06:35:31
95.92.172.250 attackspam
Unauthorized connection attempt from IP address 95.92.172.250 on Port 445(SMB)
2020-05-25 06:08:33
185.15.74.241 attackspam
Unauthorized connection attempt detected from IP address 185.15.74.241 to port 22
2020-05-25 06:30:09
219.146.126.98 attack
firewall-block, port(s): 445/tcp
2020-05-25 06:35:07

Recently Reported IPs

190.233.219.3 55.117.22.132 177.236.0.242 120.104.18.203
141.203.230.35 228.46.23.72 187.51.84.167 154.46.150.229
25.136.31.247 61.136.111.90 157.100.156.132 164.11.209.122
69.233.10.29 240.34.33.198 118.53.84.172 226.51.201.121
215.26.208.179 229.73.215.223 55.141.56.128 244.233.237.115