Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: San Jose

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 54.219.55.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20864
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;54.219.55.109.			IN	A

;; Query time: 1 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Wed Jun 30 16:35:32 CST 2021
;; MSG SIZE  rcvd: 42

'
Host info
109.55.219.54.in-addr.arpa domain name pointer ec2-54-219-55-109.us-west-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
109.55.219.54.in-addr.arpa	name = ec2-54-219-55-109.us-west-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
90.59.57.168 attackbotsspam
Feb  8 20:24:04 PAR-182295 sshd[1211587]: Failed password for invalid user mej from 90.59.57.168 port 50836 ssh2
Feb  8 20:49:52 PAR-182295 sshd[1226894]: Failed password for invalid user uls from 90.59.57.168 port 56552 ssh2
Feb  8 21:12:16 PAR-182295 sshd[1240289]: Failed password for invalid user rng from 90.59.57.168 port 47216 ssh2
2020-02-09 04:27:08
223.241.78.108 attackspambots
2020-02-06 x@x
2020-02-06 06:52:13 auth_server_login authenticator failed for (XCOjN9mVr) [223.241.78.108]:61861 I=[10.100.18.21]:25: 435 Unable to authenticate at present (set_id=eva.engdell): failed to open /etc/exim4/eximconfig/accept/auth_logins for linear search: No such file or directory
2020-02-06 06:52:18 auth_server_login authenticator failed for (qPVbbsx) [223.241.78.108]:62680 I=[10.100.18.21]:25: 435 Unable to authenticate at present (set_id=eva.engdell): failed to open /etc/exim4/eximconfig/accept/auth_logins for linear search: No such file or directory


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=223.241.78.108
2020-02-09 04:09:26
103.41.97.101 attack
20/2/8@09:23:47: FAIL: Alarm-Network address from=103.41.97.101
...
2020-02-09 04:11:20
92.222.36.74 attackspam
$f2bV_matches
2020-02-09 04:26:54
89.248.160.193 attackbots
Feb  8 20:13:27 h2177944 kernel: \[4387250.939529\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.160.193 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=28212 PROTO=TCP SPT=40106 DPT=20440 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb  8 20:13:27 h2177944 kernel: \[4387250.939544\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.160.193 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=28212 PROTO=TCP SPT=40106 DPT=20440 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb  8 20:26:25 h2177944 kernel: \[4388028.664494\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.160.193 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=23799 PROTO=TCP SPT=40106 DPT=20311 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb  8 20:26:25 h2177944 kernel: \[4388028.664510\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.160.193 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=23799 PROTO=TCP SPT=40106 DPT=20311 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb  8 20:46:18 h2177944 kernel: \[4389222.144375\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.160.193 DST=85.
2020-02-09 04:04:57
13.235.8.123 attackspambots
(sshd) Failed SSH login from 13.235.8.123 (IN/India/ec2-13-235-8-123.ap-south-1.compute.amazonaws.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Feb  8 20:09:19 elude sshd[5893]: Invalid user fsc from 13.235.8.123 port 37732
Feb  8 20:09:21 elude sshd[5893]: Failed password for invalid user fsc from 13.235.8.123 port 37732 ssh2
Feb  8 20:34:21 elude sshd[7370]: Invalid user dgx from 13.235.8.123 port 58264
Feb  8 20:34:23 elude sshd[7370]: Failed password for invalid user dgx from 13.235.8.123 port 58264 ssh2
Feb  8 20:37:57 elude sshd[7610]: Invalid user fhp from 13.235.8.123 port 59224
2020-02-09 04:10:42
129.204.185.203 attackspambots
1581171834 - 02/08/2020 21:23:54 Host: 129.204.185.203/129.204.185.203 Port: 8080 TCP Blocked
...
2020-02-09 04:07:31
112.113.227.55 attackspam
Sat Feb  8 07:23:56 2020 - Child process 32361 handling connection
Sat Feb  8 07:23:56 2020 - New connection from: 112.113.227.55:36342
Sat Feb  8 07:23:56 2020 - Sending data to client: [Login: ]
Sat Feb  8 07:24:27 2020 - Child aborting
Sat Feb  8 07:24:27 2020 - Reporting IP address: 112.113.227.55 - mflag: 0
2020-02-09 04:08:15
2001:41d0:1008:c3a:: attackspambots
xmlrpc attack
2020-02-09 03:53:05
185.233.187.67 attack
16.222.772,59-13/04 [bc27/m129] PostRequest-Spammer scoring: maputo01_x2b
2020-02-09 04:32:18
183.236.248.227 attack
Feb  8 15:23:35 debian-2gb-nbg1-2 kernel: \[3431055.312850\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=183.236.248.227 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0xE0 TTL=49 ID=36286 PROTO=TCP SPT=39933 DPT=23 WINDOW=32997 RES=0x00 SYN URGP=0
2020-02-09 04:15:28
145.239.94.191 attack
2020-02-08T15:21:00.123009scmdmz1 sshd[17637]: Invalid user umy from 145.239.94.191 port 51190
2020-02-08T15:21:00.125854scmdmz1 sshd[17637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.ip-145-239-94.eu
2020-02-08T15:21:00.123009scmdmz1 sshd[17637]: Invalid user umy from 145.239.94.191 port 51190
2020-02-08T15:21:01.989476scmdmz1 sshd[17637]: Failed password for invalid user umy from 145.239.94.191 port 51190 ssh2
2020-02-08T15:23:38.671995scmdmz1 sshd[17928]: Invalid user nsf from 145.239.94.191 port 34620
...
2020-02-09 04:15:09
68.44.146.59 attack
WP sniffing
2020-02-09 03:44:45
180.96.28.87 attackspambots
Feb  8 07:54:08 web1 sshd\[17129\]: Invalid user rao from 180.96.28.87
Feb  8 07:54:08 web1 sshd\[17129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.96.28.87
Feb  8 07:54:11 web1 sshd\[17129\]: Failed password for invalid user rao from 180.96.28.87 port 19072 ssh2
Feb  8 07:59:08 web1 sshd\[17554\]: Invalid user cro from 180.96.28.87
Feb  8 07:59:08 web1 sshd\[17554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.96.28.87
2020-02-09 04:16:39
89.248.174.46 attackbotsspam
Wordpress brute-force
2020-02-09 04:12:49

Recently Reported IPs

99.24.179.88 149.3.170.155 110.232.93.36 118.25.227.72
120.48.18.30 13.212.234.38 13.57.225.146 150.136.136.10
151.76.248.211 167.249.102.10 171.239.129.57 177.71.35.225
178.214.249.116 18.177.147.60 185.147.34.56 186.33.78.37
190.113.111.9 192.141.57.254 194.195.245.233 206.161.216.34