Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.48.53.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9310
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;54.48.53.22.			IN	A

;; AUTHORITY SECTION:
.			404	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022050600 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 06 23:14:34 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 22.53.48.54.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 22.53.48.54.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
142.93.208.219 attackspambots
Sep  5 00:35:31 hpm sshd\[13710\]: Invalid user webmaster from 142.93.208.219
Sep  5 00:35:31 hpm sshd\[13710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.208.219
Sep  5 00:35:33 hpm sshd\[13710\]: Failed password for invalid user webmaster from 142.93.208.219 port 38906 ssh2
Sep  5 00:40:11 hpm sshd\[14245\]: Invalid user mysqlmysql from 142.93.208.219
Sep  5 00:40:11 hpm sshd\[14245\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.208.219
2019-09-05 18:55:20
138.197.143.221 attackspam
Sep  4 23:49:59 kapalua sshd\[12695\]: Invalid user guest from 138.197.143.221
Sep  4 23:49:59 kapalua sshd\[12695\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.143.221
Sep  4 23:50:01 kapalua sshd\[12695\]: Failed password for invalid user guest from 138.197.143.221 port 47964 ssh2
Sep  4 23:55:28 kapalua sshd\[13294\]: Invalid user teamspeak3 from 138.197.143.221
Sep  4 23:55:28 kapalua sshd\[13294\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.143.221
2019-09-05 18:12:35
123.135.127.85 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2019-09-05 17:41:33
217.65.27.132 attackbotsspam
Sep  5 10:37:34 MK-Soft-VM5 sshd\[6673\]: Invalid user demo from 217.65.27.132 port 56946
Sep  5 10:37:34 MK-Soft-VM5 sshd\[6673\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.65.27.132
Sep  5 10:37:36 MK-Soft-VM5 sshd\[6673\]: Failed password for invalid user demo from 217.65.27.132 port 56946 ssh2
...
2019-09-05 18:44:08
188.243.66.208 attackbotsspam
Sep  5 10:39:42 microserver sshd[57792]: Invalid user jenkins from 188.243.66.208 port 56837
Sep  5 10:39:42 microserver sshd[57792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.243.66.208
Sep  5 10:39:43 microserver sshd[57792]: Failed password for invalid user jenkins from 188.243.66.208 port 56837 ssh2
Sep  5 10:44:19 microserver sshd[58433]: Invalid user postgres from 188.243.66.208 port 50229
Sep  5 10:44:19 microserver sshd[58433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.243.66.208
Sep  5 10:57:55 microserver sshd[60439]: Invalid user mongouser from 188.243.66.208 port 58687
Sep  5 10:57:55 microserver sshd[60439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.243.66.208
Sep  5 10:57:56 microserver sshd[60439]: Failed password for invalid user mongouser from 188.243.66.208 port 58687 ssh2
Sep  5 11:02:36 microserver sshd[61105]: Invalid user minecraft from 188
2019-09-05 17:37:50
117.7.235.233 attackbotsspam
Unauthorized connection attempt from IP address 117.7.235.233 on Port 445(SMB)
2019-09-05 18:02:32
117.239.217.20 attackspam
19/9/5@04:33:41: FAIL: Alarm-Intrusion address from=117.239.217.20
...
2019-09-05 18:21:33
14.116.253.142 attackspambots
Sep  5 09:30:08 game-panel sshd[12247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.116.253.142
Sep  5 09:30:10 game-panel sshd[12247]: Failed password for invalid user 1234 from 14.116.253.142 port 37208 ssh2
Sep  5 09:33:14 game-panel sshd[12349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.116.253.142
2019-09-05 18:22:39
1.54.145.71 attackspam
Unauthorized connection attempt from IP address 1.54.145.71 on Port 445(SMB)
2019-09-05 17:42:15
60.12.17.39 attackbotsspam
09/05/2019-04:34:25.541369 60.12.17.39 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 58
2019-09-05 17:31:58
159.192.141.128 attackspam
Unauthorized connection attempt from IP address 159.192.141.128 on Port 445(SMB)
2019-09-05 17:51:51
81.22.45.219 attackbots
Sep  5 12:27:33 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.219 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=38853 PROTO=TCP SPT=52961 DPT=180 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-09-05 18:54:24
94.177.202.153 attack
2019-09-05T09:26:09.497982abusebot-2.cloudsearch.cf sshd\[17238\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.202.153  user=root
2019-09-05 18:47:52
192.254.207.123 attackspambots
WordPress wp-login brute force :: 192.254.207.123 0.156 BYPASS [05/Sep/2019:18:34:04  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-09-05 17:54:35
41.67.59.14 attack
Honeypot attack, port: 445, PTR: PTR record not found
2019-09-05 18:44:41

Recently Reported IPs

30.49.142.29 92.59.59.193 148.18.126.185 20.224.235.193
179.21.149.187 89.75.246.156 217.204.255.132 102.130.21.126
162.139.121.223 250.75.61.81 82.110.39.164 26.231.111.75
98.188.160.66 192.86.19.108 99.158.205.109 216.129.119.197
167.91.229.176 215.177.81.135 112.180.182.213 180.109.85.111