Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.224.132.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23442
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;54.224.132.121.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022401 1800 900 604800 86400

;; Query time: 156 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 13:13:36 CST 2025
;; MSG SIZE  rcvd: 107
Host info
121.132.224.54.in-addr.arpa domain name pointer ec2-54-224-132-121.compute-1.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
121.132.224.54.in-addr.arpa	name = ec2-54-224-132-121.compute-1.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
61.136.184.75 attackspam
srv02 Mass scanning activity detected Target: 25827  ..
2020-08-02 19:10:30
84.38.187.194 attack
Port scan: Attack repeated for 24 hours
2020-08-02 19:14:33
46.101.11.213 attackspam
*Port Scan* detected from 46.101.11.213 (GB/United Kingdom/England/London/-). 4 hits in the last 290 seconds
2020-08-02 18:54:18
106.52.22.64 attack
Invalid user zywu from 106.52.22.64 port 52218
2020-08-02 18:46:39
198.199.77.16 attackspambots
$f2bV_matches
2020-08-02 18:57:36
165.22.54.171 attackbots
Invalid user gek from 165.22.54.171 port 43882
2020-08-02 19:04:42
167.172.98.89 attack
2020-08-02T04:17:40.096044linuxbox-skyline sshd[33371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.98.89  user=root
2020-08-02T04:17:42.483332linuxbox-skyline sshd[33371]: Failed password for root from 167.172.98.89 port 33529 ssh2
...
2020-08-02 19:12:20
200.194.23.143 attackspambots
Automatic report - Port Scan Attack
2020-08-02 19:14:14
27.75.45.24 attackbots
Unauthorized connection attempt from IP address 27.75.45.24 on Port 445(SMB)
2020-08-02 19:23:35
182.43.6.84 attackspambots
Invalid user zlc from 182.43.6.84 port 50604
2020-08-02 19:01:25
68.183.92.52 attackspam
2020-08-01 UTC: (81x) - root(81x)
2020-08-02 18:55:06
193.228.91.108 attackbots
Invalid user oracle from 193.228.91.108 port 57576
2020-08-02 18:43:26
117.51.159.1 attackbots
Invalid user esjung from 117.51.159.1 port 39222
2020-08-02 19:09:40
104.131.57.95 attackbotsspam
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-08-02 19:00:40
144.48.168.21 attackbots
Telnet Honeypot -> Telnet Bruteforce / Login
2020-08-02 18:59:22

Recently Reported IPs

246.98.214.10 247.7.207.1 188.176.120.225 48.20.19.132
131.74.55.7 143.173.34.216 217.162.237.238 26.15.232.238
4.88.75.24 135.200.193.30 210.36.140.228 238.42.133.158
154.164.247.18 166.85.109.198 55.184.96.82 128.219.126.29
47.234.185.147 167.177.30.19 243.192.174.150 141.120.216.64