Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.198.56.111
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12823
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;54.198.56.111.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021201 1800 900 604800 86400

;; Query time: 211 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 04:48:31 CST 2025
;; MSG SIZE  rcvd: 106
Host info
111.56.198.54.in-addr.arpa domain name pointer ec2-54-198-56-111.compute-1.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
111.56.198.54.in-addr.arpa	name = ec2-54-198-56-111.compute-1.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
58.33.84.251 attackspam
ssh intrusion attempt
2020-09-05 02:06:20
134.122.126.136 attack
TCP port : 27017
2020-09-05 01:45:16
107.189.11.160 attack
Sep  4 17:36:45 vps-51d81928 sshd[213009]: Invalid user test from 107.189.11.160 port 33342
Sep  4 17:36:45 vps-51d81928 sshd[213004]: Invalid user centos from 107.189.11.160 port 33336
Sep  4 17:36:45 vps-51d81928 sshd[213003]: Invalid user vagrant from 107.189.11.160 port 33338
Sep  4 17:36:45 vps-51d81928 sshd[213007]: Invalid user oracle from 107.189.11.160 port 33344
Sep  4 17:36:45 vps-51d81928 sshd[213002]: Invalid user postgres from 107.189.11.160 port 33340
...
2020-09-05 02:13:34
165.227.201.25 attackbotsspam
165.227.201.25 - - [04/Sep/2020:12:25:04 +0100] "POST /wp-login.php HTTP/1.1" 200 1795 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.227.201.25 - - [04/Sep/2020:12:25:05 +0100] "POST /wp-login.php HTTP/1.1" 200 1792 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.227.201.25 - - [04/Sep/2020:12:25:10 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-05 01:52:13
141.136.95.175 attackspambots
Attempted connection to port 445.
2020-09-05 02:07:20
37.129.30.173 attackspambots
Unauthorized connection attempt from IP address 37.129.30.173 on Port 445(SMB)
2020-09-05 01:54:26
190.134.121.239 attack
Sep  3 18:45:32 mellenthin postfix/smtpd[20459]: NOQUEUE: reject: RCPT from r190-134-121-239.dialup.adsl.anteldata.net.uy[190.134.121.239]: 554 5.7.1 Service unavailable; Client host [190.134.121.239] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/190.134.121.239; from= to= proto=ESMTP helo=
2020-09-05 02:06:39
36.81.255.151 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-05 02:18:36
161.35.84.204 attackbots
Port scan denied
2020-09-05 02:05:02
74.219.227.194 attack
Honeypot attack, port: 445, PTR: rrcs-74-219-227-194.central.biz.rr.com.
2020-09-05 01:49:48
156.210.66.194 attack
Attempted connection to port 5501.
2020-09-05 02:05:26
213.240.255.188 attackspam
Attempted connection to port 445.
2020-09-05 01:54:46
104.206.128.14 attackspam
trying to access non-authorized port
2020-09-05 01:45:48
174.243.64.122 attackbotsspam
Brute forcing email accounts
2020-09-05 02:04:38
176.126.175.49 attackspam
1 Attack(s) Detected
[DoS Attack: TCP/UDP Chargen] from source: 176.126.175.49, port 57836, Thursday, September 03, 2020 19:47:11
2020-09-05 01:55:44

Recently Reported IPs

107.148.89.196 125.108.230.28 229.223.15.116 68.44.160.102
203.129.80.191 216.122.17.23 49.99.160.123 76.16.229.149
73.133.235.166 219.155.66.13 82.167.253.191 121.192.124.189
79.63.127.195 139.89.22.112 176.122.153.188 190.161.239.250
227.115.119.175 175.61.157.228 40.94.29.90 104.150.173.165