Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Woodbridge

Region: New Jersey

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.53.107.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57217
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;54.53.107.113.			IN	A

;; AUTHORITY SECTION:
.			254	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020040101 1800 900 604800 86400

;; Query time: 171 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 02 05:00:35 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 113.107.53.54.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 113.107.53.54.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
96.30.67.133 attack
20/5/6@01:16:54: FAIL: Alarm-Network address from=96.30.67.133
...
2020-05-06 18:56:39
159.89.133.144 attackspambots
Unauthorized connection attempt detected from IP address 159.89.133.144 to port 7790
2020-05-06 18:52:57
49.88.112.70 attack
SSH login attempts
2020-05-06 18:37:46
185.170.114.25 attack
(sshd) Failed SSH login from 185.170.114.25 (DE/Germany/this-is-a-tor-node---10.artikel5ev.de): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May  6 12:51:34 amsweb01 sshd[8971]: Invalid user abell from 185.170.114.25 port 43405
May  6 12:51:35 amsweb01 sshd[8971]: Failed password for invalid user abell from 185.170.114.25 port 43405 ssh2
May  6 12:51:37 amsweb01 sshd[8971]: Failed password for invalid user abell from 185.170.114.25 port 43405 ssh2
May  6 12:51:39 amsweb01 sshd[8971]: Failed password for invalid user abell from 185.170.114.25 port 43405 ssh2
May  6 12:51:42 amsweb01 sshd[8971]: Failed password for invalid user abell from 185.170.114.25 port 43405 ssh2
2020-05-06 18:58:28
111.229.120.31 attackbotsspam
SSH invalid-user multiple login try
2020-05-06 19:04:15
129.211.92.41 attackspam
" "
2020-05-06 18:33:31
58.64.157.162 attackspambots
Brute forcing RDP port 3389
2020-05-06 19:00:24
192.241.175.250 attackbotsspam
SSH Brute-Force Attack
2020-05-06 18:43:18
207.36.12.30 attackspambots
May  6 12:15:06 legacy sshd[21553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.36.12.30
May  6 12:15:08 legacy sshd[21553]: Failed password for invalid user user01 from 207.36.12.30 port 5148 ssh2
May  6 12:18:57 legacy sshd[21720]: Failed password for root from 207.36.12.30 port 11243 ssh2
...
2020-05-06 18:45:27
181.231.83.162 attackbots
May  6 12:17:50 jane sshd[8631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.231.83.162 
May  6 12:17:52 jane sshd[8631]: Failed password for invalid user shannon from 181.231.83.162 port 32806 ssh2
...
2020-05-06 19:01:38
51.68.142.163 attackspambots
May  6 06:20:25 web01 sshd[24532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.142.163 
May  6 06:20:27 web01 sshd[24532]: Failed password for invalid user arkserver from 51.68.142.163 port 45608 ssh2
...
2020-05-06 19:03:13
119.96.189.97 attackspam
(sshd) Failed SSH login from 119.96.189.97 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May  6 11:49:07 elude sshd[3753]: Invalid user ubuntu from 119.96.189.97 port 33879
May  6 11:49:09 elude sshd[3753]: Failed password for invalid user ubuntu from 119.96.189.97 port 33879 ssh2
May  6 12:12:17 elude sshd[7327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.96.189.97  user=root
May  6 12:12:20 elude sshd[7327]: Failed password for root from 119.96.189.97 port 38359 ssh2
May  6 12:21:33 elude sshd[8683]: Invalid user pooja from 119.96.189.97 port 51490
2020-05-06 18:43:45
124.156.98.184 attackspambots
May  6 11:23:59 vpn01 sshd[24923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.98.184
May  6 11:24:00 vpn01 sshd[24923]: Failed password for invalid user admin2 from 124.156.98.184 port 60726 ssh2
...
2020-05-06 18:51:21
49.235.23.20 attackspambots
Unauthorized SSH login attempts
2020-05-06 19:01:21
218.248.240.113 attackspambots
05/05/2020-23:48:05.659332 218.248.240.113 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-05-06 18:39:50

Recently Reported IPs

192.116.104.245 177.254.224.228 107.66.82.125 76.107.96.21
106.219.0.250 45.192.180.139 124.206.101.148 106.12.106.42
203.181.165.53 174.241.166.185 220.58.120.191 153.134.75.210
52.43.161.104 39.136.146.187 118.169.226.91 140.74.84.67
189.189.235.107 124.131.157.16 176.102.89.233 27.26.98.52