Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: Amazon.com Inc.

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.214.213.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49274
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;54.214.213.7.			IN	A

;; AUTHORITY SECTION:
.			2963	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019063001 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jul 01 13:42:36 CST 2019
;; MSG SIZE  rcvd: 116
Host info
7.213.214.54.in-addr.arpa domain name pointer ec2-54-214-213-7.us-west-2.compute.amazonaws.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
7.213.214.54.in-addr.arpa	name = ec2-54-214-213-7.us-west-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
211.75.193.168 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-24 02:34:04
216.218.206.100 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-24 03:02:14
60.176.135.172 attackbotsspam
Automatic report - Port Scan
2019-10-24 02:43:07
103.48.232.123 attackspam
Oct 23 15:36:03 firewall sshd[32133]: Invalid user qazwsx12345 from 103.48.232.123
Oct 23 15:36:04 firewall sshd[32133]: Failed password for invalid user qazwsx12345 from 103.48.232.123 port 57452 ssh2
Oct 23 15:41:30 firewall sshd[32192]: Invalid user reliant from 103.48.232.123
...
2019-10-24 03:04:27
177.125.58.145 attack
Oct 23 16:18:48 xeon sshd[36199]: Failed password for root from 177.125.58.145 port 40139 ssh2
2019-10-24 03:06:56
211.155.88.36 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-24 02:29:38
212.230.180.8 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-24 02:45:07
121.233.207.215 attack
SASL broute force
2019-10-24 02:50:48
92.118.37.99 attackbotsspam
10/23/2019-14:45:04.156915 92.118.37.99 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-24 02:57:52
92.63.194.90 attackbots
Oct 23 13:48:53 mail sshd\[15041\]: Invalid user admin from 92.63.194.90
Oct 23 13:48:53 mail sshd\[15041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.90
...
2019-10-24 02:57:06
216.17.73.90 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-24 02:59:33
106.13.173.141 attackspam
5x Failed Password
2019-10-24 02:54:53
220.135.36.195 attack
0""
2019-10-24 02:51:07
103.195.7.10 attackbotsspam
TCP Port: 25 _    invalid blocked  dnsbl-sorbs also barracudacentral _  _  _ _ (503)
2019-10-24 02:45:30
106.13.4.172 attackbotsspam
Oct 23 15:20:34 legacy sshd[32434]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.4.172
Oct 23 15:20:37 legacy sshd[32434]: Failed password for invalid user file from 106.13.4.172 port 40900 ssh2
Oct 23 15:25:18 legacy sshd[32569]: Failed password for root from 106.13.4.172 port 47840 ssh2
...
2019-10-24 02:49:14

Recently Reported IPs

203.98.191.241 166.62.208.192 123.207.248.196 71.6.233.237
158.69.224.11 213.170.247.117 1.163.27.192 189.45.68.60
35.232.147.191 35.183.220.166 170.24.97.219 200.253.99.206
151.80.234.13 85.172.189.90 128.134.25.85 243.165.178.9
20.148.148.245 5.160.83.115 31.193.122.18 4.67.131.2