Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: Amazon Technologies Inc.

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
port scans
2019-11-21 05:56:59
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.69.188.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17856
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;54.69.188.94.			IN	A

;; AUTHORITY SECTION:
.			281	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019112003 1800 900 604800 86400

;; Query time: 103 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 21 05:56:56 CST 2019
;; MSG SIZE  rcvd: 116
Host info
94.188.69.54.in-addr.arpa domain name pointer ec2-54-69-188-94.us-west-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
94.188.69.54.in-addr.arpa	name = ec2-54-69-188-94.us-west-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
139.59.56.121 attackspam
Apr  6 05:52:34 vmd48417 sshd[13684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.56.121
2020-04-06 16:43:50
89.248.160.150 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 83 - port: 41146 proto: UDP cat: Misc Attack
2020-04-06 16:38:04
198.20.103.242 attackspambots
Unauthorized connection attempt detected from IP address 198.20.103.242 to port 8443
2020-04-06 16:00:21
192.241.235.11 attackbots
2020-04-06T09:40:51.572930  sshd[5372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.235.11  user=root
2020-04-06T09:40:53.876135  sshd[5372]: Failed password for root from 192.241.235.11 port 55106 ssh2
2020-04-06T09:54:58.890071  sshd[5656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.235.11  user=root
2020-04-06T09:55:00.806492  sshd[5656]: Failed password for root from 192.241.235.11 port 54772 ssh2
...
2020-04-06 16:33:14
192.144.235.246 attackspam
Apr  6 08:38:16 cloud sshd[629]: Failed password for root from 192.144.235.246 port 43926 ssh2
2020-04-06 16:25:51
157.230.127.240 attackbots
(sshd) Failed SSH login from 157.230.127.240 (DE/Germany/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  6 06:50:41 srv sshd[32566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.127.240  user=root
Apr  6 06:50:42 srv sshd[32566]: Failed password for root from 157.230.127.240 port 57636 ssh2
Apr  6 06:54:23 srv sshd[32677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.127.240  user=root
Apr  6 06:54:25 srv sshd[32677]: Failed password for root from 157.230.127.240 port 35990 ssh2
Apr  6 06:57:18 srv sshd[32712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.127.240  user=root
2020-04-06 16:20:43
200.69.250.253 attack
Bruteforce detected by fail2ban
2020-04-06 16:07:49
163.44.149.235 attack
Apr  6 09:09:25 pi sshd[10471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44.149.235  user=root
Apr  6 09:09:27 pi sshd[10471]: Failed password for invalid user root from 163.44.149.235 port 37618 ssh2
2020-04-06 16:13:17
152.136.106.240 attackspambots
Apr  6 08:39:47 localhost sshd[14684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.106.240  user=root
Apr  6 08:39:49 localhost sshd[14684]: Failed password for root from 152.136.106.240 port 51994 ssh2
...
2020-04-06 16:24:32
37.208.12.131 attackbotsspam
(sshd) Failed SSH login from 37.208.12.131 (SE/Sweden/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  6 05:52:23 ubnt-55d23 sshd[16149]: Invalid user pi from 37.208.12.131 port 55160
Apr  6 05:52:23 ubnt-55d23 sshd[16151]: Invalid user pi from 37.208.12.131 port 55168
2020-04-06 16:47:56
112.85.42.181 attack
Apr  6 09:59:29 pve sshd[5504]: Failed password for root from 112.85.42.181 port 37379 ssh2
Apr  6 09:59:34 pve sshd[5504]: Failed password for root from 112.85.42.181 port 37379 ssh2
Apr  6 09:59:37 pve sshd[5504]: Failed password for root from 112.85.42.181 port 37379 ssh2
Apr  6 09:59:41 pve sshd[5504]: Failed password for root from 112.85.42.181 port 37379 ssh2
2020-04-06 16:11:32
106.12.137.1 attack
2020-04-06T04:18:19.496754shield sshd\[21493\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.1  user=root
2020-04-06T04:18:21.539837shield sshd\[21493\]: Failed password for root from 106.12.137.1 port 43448 ssh2
2020-04-06T04:20:30.338104shield sshd\[21927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.1  user=root
2020-04-06T04:20:32.366529shield sshd\[21927\]: Failed password for root from 106.12.137.1 port 44942 ssh2
2020-04-06T04:22:40.834119shield sshd\[22445\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.1  user=root
2020-04-06 16:52:54
115.68.187.150 attack
Apr  6 08:35:38 freya sshd[23845]: Disconnected from authenticating user root 115.68.187.150 port 37890 [preauth]
Apr  6 08:37:40 freya sshd[24155]: Invalid user admin from 115.68.187.150 port 47951
Apr  6 08:37:41 freya sshd[24155]: Disconnected from invalid user admin 115.68.187.150 port 47951 [preauth]
Apr  6 08:39:42 freya sshd[24526]: Invalid user postgres from 115.68.187.150 port 58016
Apr  6 08:39:43 freya sshd[24526]: Disconnected from invalid user postgres 115.68.187.150 port 58016 [preauth]
...
2020-04-06 16:41:29
179.104.231.175 attackbotsspam
Apr  6 07:43:57 sip sshd[15758]: Failed password for root from 179.104.231.175 port 60567 ssh2
Apr  6 07:52:30 sip sshd[18883]: Failed password for root from 179.104.231.175 port 59748 ssh2
2020-04-06 16:40:56
45.141.87.20 attackspambots
RDP Bruteforce
2020-04-06 16:25:12

Recently Reported IPs

24.226.148.214 42.153.144.249 151.73.6.195 78.188.218.80
92.46.171.47 190.32.20.19 183.81.158.74 49.229.29.50
217.23.9.11 124.109.43.194 109.126.199.176 157.245.199.78
40.77.167.63 119.186.99.157 77.228.153.19 108.12.147.7
180.97.30.81 58.171.216.91 167.60.11.203 203.150.138.191