Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.220.115.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38871
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;54.220.115.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 07:34:05 CST 2025
;; MSG SIZE  rcvd: 107
Host info
242.115.220.54.in-addr.arpa domain name pointer ec2-54-220-115-242.eu-west-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.115.220.54.in-addr.arpa	name = ec2-54-220-115-242.eu-west-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
206.189.33.130 attack
Aug 16 02:37:54 tdfoods sshd\[26938\]: Invalid user tarmo from 206.189.33.130
Aug 16 02:37:54 tdfoods sshd\[26938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.33.130
Aug 16 02:37:56 tdfoods sshd\[26938\]: Failed password for invalid user tarmo from 206.189.33.130 port 54190 ssh2
Aug 16 02:43:13 tdfoods sshd\[27613\]: Invalid user dedicated from 206.189.33.130
Aug 16 02:43:13 tdfoods sshd\[27613\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.33.130
2019-08-16 20:51:23
83.94.206.60 attack
Invalid user user from 83.94.206.60 port 44421
2019-08-16 20:54:19
83.246.93.211 attackbotsspam
2019-08-16T11:53:29.465845abusebot-6.cloudsearch.cf sshd\[5360\]: Invalid user contact from 83.246.93.211 port 34669
2019-08-16 21:29:30
118.89.197.212 attackspambots
Aug 16 15:04:31 eventyay sshd[809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.197.212
Aug 16 15:04:34 eventyay sshd[809]: Failed password for invalid user tara from 118.89.197.212 port 44412 ssh2
Aug 16 15:11:01 eventyay sshd[2622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.197.212
...
2019-08-16 21:18:54
92.222.87.124 attackspam
Invalid user huang from 92.222.87.124 port 38030
2019-08-16 21:09:57
188.165.206.185 attackspam
Aug 16 14:23:13 MK-Soft-Root1 sshd\[14705\]: Invalid user link from 188.165.206.185 port 37430
Aug 16 14:23:13 MK-Soft-Root1 sshd\[14705\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.206.185
Aug 16 14:23:15 MK-Soft-Root1 sshd\[14705\]: Failed password for invalid user link from 188.165.206.185 port 37430 ssh2
...
2019-08-16 20:58:45
103.228.55.79 attack
Aug 16 14:26:34 MK-Soft-Root1 sshd\[15214\]: Invalid user Server from 103.228.55.79 port 35636
Aug 16 14:26:34 MK-Soft-Root1 sshd\[15214\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.228.55.79
Aug 16 14:26:35 MK-Soft-Root1 sshd\[15214\]: Failed password for invalid user Server from 103.228.55.79 port 35636 ssh2
...
2019-08-16 21:22:27
23.129.64.188 attack
[ssh] SSH attack
2019-08-16 21:43:27
123.206.30.76 attackspam
Invalid user pcrippen from 123.206.30.76 port 35786
2019-08-16 21:03:54
202.67.46.30 attackbots
139/tcp 139/tcp
[2019-08-16]2pkt
2019-08-16 21:10:18
147.135.255.107 attack
Aug 16 13:31:52 MK-Soft-VM4 sshd\[23907\]: Invalid user a from 147.135.255.107 port 41004
Aug 16 13:31:52 MK-Soft-VM4 sshd\[23907\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.255.107
Aug 16 13:31:55 MK-Soft-VM4 sshd\[23907\]: Failed password for invalid user a from 147.135.255.107 port 41004 ssh2
...
2019-08-16 21:41:48
118.25.152.121 attackbots
Invalid user alexander from 118.25.152.121 port 32854
2019-08-16 21:19:32
118.24.212.41 attackbotsspam
2019-08-16T12:23:28.894851abusebot-5.cloudsearch.cf sshd\[15632\]: Invalid user skdb from 118.24.212.41 port 47936
2019-08-16 21:48:48
66.143.231.89 attack
Aug 16 07:17:23 vps647732 sshd[26163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.143.231.89
Aug 16 07:17:25 vps647732 sshd[26163]: Failed password for invalid user nexus from 66.143.231.89 port 58675 ssh2
...
2019-08-16 20:56:37
68.183.46.73 attack
Invalid user scottm from 68.183.46.73 port 46186
2019-08-16 20:57:54

Recently Reported IPs

52.70.179.144 148.220.127.183 214.254.226.87 228.254.64.47
55.33.248.127 24.23.6.77 162.216.184.81 254.140.57.199
187.97.49.235 32.51.125.64 125.202.233.72 45.142.143.220
170.132.243.225 67.184.130.34 217.59.121.128 153.53.121.21
82.174.212.133 61.182.30.244 128.112.197.79 191.233.95.176