Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: Amazon.com Inc.

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackbots
Lines containing failures of 54.242.33.106
Sep  5 20:18:26 shared11 sshd[3019]: Invalid user odoo from 54.242.33.106 port 37866
Sep  5 20:18:26 shared11 sshd[3019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.242.33.106
Sep  5 20:18:28 shared11 sshd[3019]: Failed password for invalid user odoo from 54.242.33.106 port 37866 ssh2
Sep  5 20:18:28 shared11 sshd[3019]: Received disconnect from 54.242.33.106 port 37866:11: Bye Bye [preauth]
Sep  5 20:18:28 shared11 sshd[3019]: Disconnected from invalid user odoo 54.242.33.106 port 37866 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=54.242.33.106
2019-09-06 09:24:48
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.242.33.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48012
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;54.242.33.106.			IN	A

;; AUTHORITY SECTION:
.			2190	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090501 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Sep 06 09:24:43 CST 2019
;; MSG SIZE  rcvd: 117
Host info
106.33.242.54.in-addr.arpa domain name pointer ec2-54-242-33-106.compute-1.amazonaws.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
106.33.242.54.in-addr.arpa	name = ec2-54-242-33-106.compute-1.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
194.180.224.103 attack
Invalid user user from 194.180.224.103 port 37980
2020-08-30 13:06:41
186.251.224.200 attack
Invalid user teamspeak3 from 186.251.224.200 port 44902
2020-08-30 13:06:26
218.92.0.246 attackspam
Aug 30 07:17:25 MainVPS sshd[18772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.246  user=root
Aug 30 07:17:27 MainVPS sshd[18772]: Failed password for root from 218.92.0.246 port 38726 ssh2
Aug 30 07:17:42 MainVPS sshd[18772]: error: maximum authentication attempts exceeded for root from 218.92.0.246 port 38726 ssh2 [preauth]
Aug 30 07:17:25 MainVPS sshd[18772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.246  user=root
Aug 30 07:17:27 MainVPS sshd[18772]: Failed password for root from 218.92.0.246 port 38726 ssh2
Aug 30 07:17:42 MainVPS sshd[18772]: error: maximum authentication attempts exceeded for root from 218.92.0.246 port 38726 ssh2 [preauth]
Aug 30 07:17:47 MainVPS sshd[18917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.246  user=root
Aug 30 07:17:49 MainVPS sshd[18917]: Failed password for root from 218.92.0.246 port 1861 ssh2
...
2020-08-30 13:18:29
125.124.1.189 attackspambots
Multiple SSH authentication failures from 125.124.1.189
2020-08-30 13:22:09
111.231.145.104 attackspambots
Failed password for invalid user jur from 111.231.145.104 port 38108 ssh2
2020-08-30 13:27:21
139.59.78.236 attack
5 failures
2020-08-30 13:19:01
218.92.0.168 attackbots
Aug 30 07:09:29 vps647732 sshd[24174]: Failed password for root from 218.92.0.168 port 60439 ssh2
Aug 30 07:09:32 vps647732 sshd[24174]: Failed password for root from 218.92.0.168 port 60439 ssh2
...
2020-08-30 13:12:16
45.129.36.173 attack
Aug 30 10:26:04 gw1 sshd[16135]: Failed password for root from 45.129.36.173 port 56638 ssh2
...
2020-08-30 13:35:58
110.138.248.61 attack
1598759580 - 08/30/2020 05:53:00 Host: 110.138.248.61/110.138.248.61 Port: 445 TCP Blocked
2020-08-30 13:22:52
212.70.149.20 attackspam
Aug 30 06:50:32 cho postfix/smtpd[1905214]: warning: unknown[212.70.149.20]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 30 06:50:58 cho postfix/smtpd[1906288]: warning: unknown[212.70.149.20]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 30 06:51:24 cho postfix/smtpd[1906288]: warning: unknown[212.70.149.20]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 30 06:51:50 cho postfix/smtpd[1906288]: warning: unknown[212.70.149.20]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 30 06:52:16 cho postfix/smtpd[1905214]: warning: unknown[212.70.149.20]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-30 12:57:54
5.57.33.71 attack
Aug 30 05:00:30 l02a sshd[23928]: Invalid user ubuntu from 5.57.33.71
Aug 30 05:00:30 l02a sshd[23928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.57.33.71 
Aug 30 05:00:30 l02a sshd[23928]: Invalid user ubuntu from 5.57.33.71
Aug 30 05:00:32 l02a sshd[23928]: Failed password for invalid user ubuntu from 5.57.33.71 port 38276 ssh2
2020-08-30 13:29:04
138.68.99.46 attack
2020-08-29T22:47:53.592275server.mjenks.net sshd[1076461]: Failed password for invalid user prueba from 138.68.99.46 port 41622 ssh2
2020-08-29T22:52:36.556279server.mjenks.net sshd[1076961]: Invalid user dereck from 138.68.99.46 port 50448
2020-08-29T22:52:36.563599server.mjenks.net sshd[1076961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.99.46
2020-08-29T22:52:36.556279server.mjenks.net sshd[1076961]: Invalid user dereck from 138.68.99.46 port 50448
2020-08-29T22:52:38.200477server.mjenks.net sshd[1076961]: Failed password for invalid user dereck from 138.68.99.46 port 50448 ssh2
...
2020-08-30 13:31:26
121.254.133.205 attackbots
Invalid user oracle from 121.254.133.205 port 6664
2020-08-30 13:23:54
134.209.22.239 attackspam
Port Scan detected!
...
2020-08-30 13:07:36
121.43.189.248 attack
2020-08-30T07:39:28.146435mail.standpoint.com.ua sshd[14837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.43.189.248
2020-08-30T07:39:28.142647mail.standpoint.com.ua sshd[14837]: Invalid user abc from 121.43.189.248 port 55242
2020-08-30T07:39:30.154592mail.standpoint.com.ua sshd[14837]: Failed password for invalid user abc from 121.43.189.248 port 55242 ssh2
2020-08-30T07:40:22.065491mail.standpoint.com.ua sshd[14971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.43.189.248  user=bin
2020-08-30T07:40:24.153922mail.standpoint.com.ua sshd[14971]: Failed password for bin from 121.43.189.248 port 60252 ssh2
...
2020-08-30 13:01:00

Recently Reported IPs

122.205.33.199 65.247.244.209 129.95.53.68 156.36.120.140
196.250.247.195 204.17.105.186 92.132.118.232 76.200.114.224
178.76.121.251 233.57.55.110 25.1.194.81 144.147.132.136
29.3.203.126 90.25.0.167 175.181.159.229 80.39.250.108
73.100.197.103 65.49.250.251 126.20.195.142 104.198.97.246