Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Sydney

Region: New South Wales

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.66.101.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46550
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;54.66.101.213.			IN	A

;; AUTHORITY SECTION:
.			390	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019112602 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Nov 27 05:01:39 CST 2019
;; MSG SIZE  rcvd: 117
Host info
213.101.66.54.in-addr.arpa domain name pointer ec2-54-66-101-213.ap-southeast-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
213.101.66.54.in-addr.arpa	name = ec2-54-66-101-213.ap-southeast-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
180.117.100.34 attackspam
Unauthorized connection attempt detected from IP address 180.117.100.34 to port 23
2020-06-22 05:41:05
51.195.53.7 attack
Failed password for invalid user from 51.195.53.7 port 36026 ssh2
2020-06-22 05:27:32
100.37.40.62 attackbotsspam
Unauthorized connection attempt detected from IP address 100.37.40.62 to port 2323
2020-06-22 05:43:24
2.42.136.186 attack
Unauthorized connection attempt detected from IP address 2.42.136.186 to port 2323
2020-06-22 05:48:11
51.77.58.112 attackspam
Jun 21 23:12:14 lnxweb62 sshd[22498]: Failed password for root from 51.77.58.112 port 14352 ssh2
Jun 21 23:12:14 lnxweb62 sshd[22498]: Failed password for root from 51.77.58.112 port 14352 ssh2
2020-06-22 05:23:14
152.168.32.226 attack
Unauthorized connection attempt detected from IP address 152.168.32.226 to port 23
2020-06-22 05:56:38
27.151.29.205 attack
Unauthorized connection attempt detected from IP address 27.151.29.205 to port 22
2020-06-22 05:47:05
200.8.44.62 attack
Unauthorized connection attempt detected from IP address 200.8.44.62 to port 5555
2020-06-22 05:50:09
192.140.111.69 attackbotsspam
Unauthorized connection attempt detected from IP address 192.140.111.69 to port 88
2020-06-22 05:52:25
101.83.199.75 attackspam
Unauthorized connection attempt detected from IP address 101.83.199.75 to port 23
2020-06-22 05:58:40
171.81.80.12 attackspam
Unauthorized connection attempt detected from IP address 171.81.80.12 to port 23
2020-06-22 05:56:16
175.24.103.72 attackspam
Jun 21 22:52:43 h2779839 sshd[1895]: Invalid user gituser from 175.24.103.72 port 51026
Jun 21 22:52:43 h2779839 sshd[1895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.103.72
Jun 21 22:52:43 h2779839 sshd[1895]: Invalid user gituser from 175.24.103.72 port 51026
Jun 21 22:52:45 h2779839 sshd[1895]: Failed password for invalid user gituser from 175.24.103.72 port 51026 ssh2
Jun 21 22:57:06 h2779839 sshd[2133]: Invalid user amir from 175.24.103.72 port 45748
Jun 21 22:57:07 h2779839 sshd[2133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.103.72
Jun 21 22:57:06 h2779839 sshd[2133]: Invalid user amir from 175.24.103.72 port 45748
Jun 21 22:57:08 h2779839 sshd[2133]: Failed password for invalid user amir from 175.24.103.72 port 45748 ssh2
Jun 21 23:01:33 h2779839 sshd[2230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.103.72  user=root
Jun
...
2020-06-22 05:23:36
100.25.21.165 attack
Jun 20 23:58:31 localhost sshd[36842]: Invalid user mrm from 100.25.21.165 port 59394
Jun 20 23:58:31 localhost sshd[36842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=100.25.21.165 
Jun 20 23:58:31 localhost sshd[36842]: Invalid user mrm from 100.25.21.165 port 59394
Jun 20 23:58:32 localhost sshd[36842]: Failed password for invalid user mrm from 100.25.21.165 port 59394 ssh2
Jun 21 00:17:36 localhost sshd[44000]: Invalid user vod from 100.25.21.165 port 41458
Jun 21 00:17:36 localhost sshd[44000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=100.25.21.165 
Jun 21 00:17:36 localhost sshd[44000]: Invalid user vod from 100.25.21.165 port 41458
Jun 21 00:17:38 localhost sshd[44000]: Failed password for invalid user vod from 100.25.21.165 port 41458 ssh2
Jun 21 01:45:07 localhost sshd[80536]: Invalid user tiles from 100.25.21.165 port 35692


........
-----------------------------------------------
https://www.blocklist.de/en
2020-06-22 05:34:50
202.138.234.18 attackbotsspam
Unauthorized connection attempt detected from IP address 202.138.234.18 to port 445
2020-06-22 05:36:25
142.177.56.127 attackbotsspam
Unauthorized connection attempt detected from IP address 142.177.56.127 to port 81
2020-06-22 05:56:55

Recently Reported IPs

95.85.183.137 89.44.49.71 124.225.31.114 161.44.200.140
75.182.39.176 120.23.112.109 112.114.107.154 42.126.126.140
54.36.48.48 56.242.193.255 58.44.73.64 189.121.225.199
66.138.83.184 200.194.40.102 184.160.123.117 65.127.71.53
139.198.109.234 120.123.174.81 85.187.85.240 187.46.7.84