Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.52.161.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59816
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;54.52.161.149.			IN	A

;; AUTHORITY SECTION:
.			569	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023110800 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Nov 08 21:16:27 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 149.161.52.54.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.161.52.54.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
77.243.126.211 attackbots
[portscan] Port scan
2019-06-25 19:04:04
165.22.96.224 attackspambots
Automated report - ssh fail2ban:
Jun 25 09:00:05 wrong password, user=dayz, port=46342, ssh2
Jun 25 09:31:01 authentication failure 
Jun 25 09:31:02 wrong password, user=mqm, port=37042, ssh2
2019-06-25 18:48:17
192.241.233.153 attackspambots
php WP PHPmyadamin ABUSE blocked for 12h
2019-06-25 18:54:53
54.39.151.22 attackbotsspam
frenzy
2019-06-25 18:37:53
104.128.69.146 attackspam
Jun 25 16:29:38 tanzim-HP-Z238-Microtower-Workstation sshd\[23359\]: Invalid user dale from 104.128.69.146
Jun 25 16:29:38 tanzim-HP-Z238-Microtower-Workstation sshd\[23359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.128.69.146
Jun 25 16:29:40 tanzim-HP-Z238-Microtower-Workstation sshd\[23359\]: Failed password for invalid user dale from 104.128.69.146 port 33048 ssh2
...
2019-06-25 19:05:52
51.158.124.35 attackspam
Jun 25 06:51:51 Tower sshd[26501]: Connection from 51.158.124.35 port 56038 on 192.168.10.220 port 22
Jun 25 06:51:52 Tower sshd[26501]: Invalid user uploader from 51.158.124.35 port 56038
Jun 25 06:51:52 Tower sshd[26501]: error: Could not get shadow information for NOUSER
Jun 25 06:51:52 Tower sshd[26501]: Failed password for invalid user uploader from 51.158.124.35 port 56038 ssh2
Jun 25 06:51:52 Tower sshd[26501]: Received disconnect from 51.158.124.35 port 56038:11: Bye Bye [preauth]
Jun 25 06:51:52 Tower sshd[26501]: Disconnected from invalid user uploader 51.158.124.35 port 56038 [preauth]
2019-06-25 19:06:15
150.129.118.220 attackbotsspam
Jun 25 11:48:24 MK-Soft-Root2 sshd\[6514\]: Invalid user mongo from 150.129.118.220 port 41821
Jun 25 11:48:24 MK-Soft-Root2 sshd\[6514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.129.118.220
Jun 25 11:48:26 MK-Soft-Root2 sshd\[6514\]: Failed password for invalid user mongo from 150.129.118.220 port 41821 ssh2
...
2019-06-25 18:36:54
31.46.143.244 attackspambots
Jun 25 10:55:21 v22018076622670303 sshd\[31521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.46.143.244  user=root
Jun 25 10:55:22 v22018076622670303 sshd\[31521\]: Failed password for root from 31.46.143.244 port 60374 ssh2
Jun 25 11:03:12 v22018076622670303 sshd\[31536\]: Invalid user siverko from 31.46.143.244 port 49980
Jun 25 11:03:12 v22018076622670303 sshd\[31536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.46.143.244
...
2019-06-25 18:31:39
194.182.67.69 attackspambots
Jun 25 11:15:40 XXX sshd[12988]: Invalid user postgres from 194.182.67.69 port 50382
2019-06-25 18:42:48
81.100.188.235 attackspambots
Jun 25 08:58:38 XXX sshd[9142]: Invalid user ji from 81.100.188.235 port 57718
2019-06-25 18:33:59
178.93.63.194 attackbots
firewall-block, port(s): 80/tcp
2019-06-25 18:12:59
18.224.186.171 attackbots
php WP PHPmyadamin ABUSE blocked for 12h
2019-06-25 18:40:57
223.196.77.74 attackspam
Unauthorized connection attempt from IP address 223.196.77.74 on Port 445(SMB)
2019-06-25 18:15:51
125.16.240.71 attackbotsspam
445/tcp 445/tcp 445/tcp...
[2019-04-27/06-25]21pkt,1pt.(tcp)
2019-06-25 18:14:35
46.229.168.145 attack
Automatic report - Web App Attack
2019-06-25 19:00:07

Recently Reported IPs

10.83.113.232 103.13.97.13 120.229.136.0 118.114.112.96
180.163.29.79 167.172.7.142 103.13.97.100 172.67.155.159
46.126.45.3 138.199.37.169 165.227.112.152 109.237.217.212
103.13.97.233 121.186.84.26 38.207.142.244 10.0.21.234
56.23.190.17 73.226.170.187 217.117.69.81 97.228.173.4