Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.242.161.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21266
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;54.242.161.99.			IN	A

;; AUTHORITY SECTION:
.			421	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 03:49:28 CST 2022
;; MSG SIZE  rcvd: 106
Host info
99.161.242.54.in-addr.arpa domain name pointer ec2-54-242-161-99.compute-1.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.161.242.54.in-addr.arpa	name = ec2-54-242-161-99.compute-1.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
89.144.10.197 attackbotsspam
Postfix RBL failed
2020-06-04 18:45:39
207.194.35.197 attackbotsspam
Jun  4 06:41:14 ws12vmsma01 sshd[24741]: Failed password for root from 207.194.35.197 port 49938 ssh2
Jun  4 06:44:53 ws12vmsma01 sshd[25553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.194.35.197  user=root
Jun  4 06:44:55 ws12vmsma01 sshd[25553]: Failed password for root from 207.194.35.197 port 52850 ssh2
...
2020-06-04 18:46:00
221.163.8.108 attackspambots
$f2bV_matches
2020-06-04 19:08:52
106.12.34.97 attackbotsspam
Jun  4 05:00:46 Tower sshd[28379]: Connection from 106.12.34.97 port 40084 on 192.168.10.220 port 22 rdomain ""
Jun  4 05:00:48 Tower sshd[28379]: Failed password for root from 106.12.34.97 port 40084 ssh2
Jun  4 05:00:49 Tower sshd[28379]: Received disconnect from 106.12.34.97 port 40084:11: Bye Bye [preauth]
Jun  4 05:00:49 Tower sshd[28379]: Disconnected from authenticating user root 106.12.34.97 port 40084 [preauth]
2020-06-04 18:49:03
49.233.185.63 attackbots
Jun  4 03:30:58 localhost sshd\[13640\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.185.63  user=root
Jun  4 03:31:01 localhost sshd\[13640\]: Failed password for root from 49.233.185.63 port 33358 ssh2
Jun  4 03:47:29 localhost sshd\[13843\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.185.63  user=root
...
2020-06-04 19:03:09
111.229.103.67 attackspam
Jun  4 12:46:38 Ubuntu-1404-trusty-64-minimal sshd\[25532\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.103.67  user=root
Jun  4 12:46:40 Ubuntu-1404-trusty-64-minimal sshd\[25532\]: Failed password for root from 111.229.103.67 port 56668 ssh2
Jun  4 13:04:00 Ubuntu-1404-trusty-64-minimal sshd\[8884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.103.67  user=root
Jun  4 13:04:02 Ubuntu-1404-trusty-64-minimal sshd\[8884\]: Failed password for root from 111.229.103.67 port 54210 ssh2
Jun  4 13:09:19 Ubuntu-1404-trusty-64-minimal sshd\[14598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.103.67  user=root
2020-06-04 19:19:21
85.209.0.103 attackbotsspam
2020-06-03 UTC: (2x) - root(2x)
2020-06-04 19:04:41
139.155.17.76 attackbots
2020-06-04T14:10:43.108914lavrinenko.info sshd[2782]: Failed password for root from 139.155.17.76 port 58444 ssh2
2020-06-04T14:11:42.128094lavrinenko.info sshd[2858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.17.76  user=root
2020-06-04T14:11:43.889998lavrinenko.info sshd[2858]: Failed password for root from 139.155.17.76 port 43002 ssh2
2020-06-04T14:12:43.217820lavrinenko.info sshd[2926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.17.76  user=root
2020-06-04T14:12:45.019133lavrinenko.info sshd[2926]: Failed password for root from 139.155.17.76 port 55792 ssh2
...
2020-06-04 19:18:49
99.34.200.17 attackspambots
Jun  4 05:47:11 host sshd[29700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=adsl-99-34-200-17.dsl.ipltin.sbcglobal.net  user=root
Jun  4 05:47:14 host sshd[29700]: Failed password for root from 99.34.200.17 port 29995 ssh2
...
2020-06-04 19:13:39
178.62.27.144 attack
sshd jail - ssh hack attempt
2020-06-04 18:58:23
119.96.158.238 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2020-06-04 18:42:38
178.128.248.121 attack
Jun  4 08:11:29 cdc sshd[26556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.248.121  user=root
Jun  4 08:11:31 cdc sshd[26556]: Failed password for invalid user root from 178.128.248.121 port 37056 ssh2
2020-06-04 18:51:43
138.197.129.38 attackspam
Jun  4 10:37:00 jumpserver sshd[71939]: Failed password for root from 138.197.129.38 port 45764 ssh2
Jun  4 10:40:50 jumpserver sshd[71987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.129.38  user=root
Jun  4 10:40:52 jumpserver sshd[71987]: Failed password for root from 138.197.129.38 port 49222 ssh2
...
2020-06-04 18:52:13
218.144.106.106 attackspam
port scan and connect, tcp 23 (telnet)
2020-06-04 18:50:24
191.7.158.65 attackspam
2020-06-04T05:33:46.6423111495-001 sshd[45772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.7.158.65  user=root
2020-06-04T05:33:48.3998561495-001 sshd[45772]: Failed password for root from 191.7.158.65 port 39656 ssh2
2020-06-04T05:37:54.5943481495-001 sshd[45909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.7.158.65  user=root
2020-06-04T05:37:56.7286911495-001 sshd[45909]: Failed password for root from 191.7.158.65 port 44002 ssh2
2020-06-04T05:41:59.1335731495-001 sshd[46037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.7.158.65  user=root
2020-06-04T05:42:00.9015751495-001 sshd[46037]: Failed password for root from 191.7.158.65 port 48340 ssh2
...
2020-06-04 19:09:05

Recently Reported IPs

122.117.197.194 120.85.142.176 175.107.8.60 120.85.41.153
105.213.98.28 180.254.183.238 45.85.160.139 46.23.62.138
103.21.232.53 178.72.77.172 203.238.107.2 36.72.215.20
58.8.119.96 187.250.231.145 101.0.54.0 93.170.206.2
34.68.27.119 94.182.3.168 5.157.27.133 200.77.198.191