Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#


NetRange:       54.48.0.0 - 54.53.255.255
CIDR:           54.52.0.0/15, 54.48.0.0/14
NetName:        MERCK2
NetHandle:      NET-54-48-0-0-1
Parent:         NET54 (NET-54-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Merck and Co., Inc. (MERCKA)
RegDate:        1992-03-17
Updated:        2022-09-26
Ref:            https://rdap.arin.net/registry/ip/54.48.0.0


OrgName:        Merck and Co., Inc.
OrgId:          MERCKA
Address:        126 East Lincoln Avenue
City:           Rahway
StateProv:      NJ
PostalCode:     07065
Country:        US
RegDate:        1992-03-17
Updated:        2025-05-06
Ref:            https://rdap.arin.net/registry/entity/MERCKA


OrgAbuseHandle: WHITE7-ARIN
OrgAbuseName:   Whitehouse Telecom
OrgAbusePhone:  +1-908-423-2900 
OrgAbuseEmail:  mark_shihata@merck.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/WHITE7-ARIN

OrgTechHandle: WHITE7-ARIN
OrgTechName:   Whitehouse Telecom
OrgTechPhone:  +1-908-423-2900 
OrgTechEmail:  mark_shihata@merck.com
OrgTechRef:    https://rdap.arin.net/registry/entity/WHITE7-ARIN

OrgNOCHandle: WHITE7-ARIN
OrgNOCName:   Whitehouse Telecom
OrgNOCPhone:  +1-908-423-2900 
OrgNOCEmail:  mark_shihata@merck.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/WHITE7-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.48.40.35
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40394
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;54.48.40.35.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025102301 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 24 05:38:28 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 35.40.48.54.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 35.40.48.54.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
115.84.112.138 attack
(imapd) Failed IMAP login from 115.84.112.138 (LA/Laos/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Sep  9 05:50:37 ir1 dovecot[3110802]: imap-login: Disconnected (auth failed, 1 attempts in 18 secs): user=, method=PLAIN, rip=115.84.112.138, lip=5.63.12.44, session=
2020-09-09 12:03:33
113.200.78.221 attack
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth):
2020-09-09 08:42:56
2001:b011:8004:4504:d84a:b9b6:d089:41cf attack
Attempted Email Sync. Password Hacking/Probing.
2020-09-09 08:29:42
167.71.161.200 attackspam
bruteforce detected
2020-09-09 08:26:25
51.77.140.110 attackbotsspam
51.77.140.110 - - [09/Sep/2020:02:10:25 +0200] "GET /wp-login.php HTTP/1.1" 200 8796 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.77.140.110 - - [09/Sep/2020:02:10:26 +0200] "POST /wp-login.php HTTP/1.1" 200 9047 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.77.140.110 - - [09/Sep/2020:02:10:27 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-09 08:19:36
193.124.129.195 attackspam
Attempted Email Sync. Password Hacking/Probing.
2020-09-09 08:33:15
3.131.82.158 attackbotsspam
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root
2020-09-09 08:41:53
152.32.167.105 attackspambots
2020-09-08 19:13:52.558850-0500  localhost sshd[15438]: Failed password for root from 152.32.167.105 port 37932 ssh2
2020-09-09 08:28:37
123.21.103.80 attack
Attempted Email Sync. Password Hacking/Probing.
2020-09-09 08:20:47
47.47.129.78 attackbotsspam
Attempted Email Sync. Password Hacking/Probing.
2020-09-09 08:39:08
240e:390:1040:1f5b:246:5d43:7e00:189c attackbots
Attempted Email Sync. Password Hacking/Probing.
2020-09-09 08:27:16
95.55.161.230 attack
Attempted Email Sync. Password Hacking/Probing.
2020-09-09 08:36:24
45.63.83.160 attack
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root
2020-09-09 12:08:12
36.84.59.38 attackspam
Attempted Email Sync. Password Hacking/Probing.
2020-09-09 08:35:29
240e:390:1040:2906:246:5d3f:d100:189c attackbotsspam
Attempted Email Sync. Password Hacking/Probing.
2020-09-09 08:25:52

Recently Reported IPs

134.209.239.42 118.48.249.229 51.158.54.10 3.83.240.53
59.82.83.241 59.82.135.46 176.65.149.253 59.82.83.27
59.82.83.219 59.82.83.64 59.82.83.29 59.82.135.164
54.235.42.72 44.203.38.131 20.64.105.47 59.82.135.2
59.82.83.226 59.82.83.210 59.82.83.172 59.82.83.16