Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.81.160.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37561
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;54.81.160.119.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 12:20:07 CST 2025
;; MSG SIZE  rcvd: 106
Host info
119.160.81.54.in-addr.arpa domain name pointer ec2-54-81-160-119.compute-1.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
119.160.81.54.in-addr.arpa	name = ec2-54-81-160-119.compute-1.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
190.73.105.138 attack
Unauthorized connection attempt from IP address 190.73.105.138 on Port 445(SMB)
2020-09-29 06:40:16
178.62.72.89 attack
38082/tcp 8545/tcp 20332/tcp...
[2020-09-14/27]26pkt,11pt.(tcp)
2020-09-29 06:40:28
78.199.19.89 attack
$f2bV_matches
2020-09-29 06:35:26
51.158.190.54 attackspambots
Sep 28 16:23:44 h2865660 sshd[10655]: Invalid user oratest from 51.158.190.54 port 47658
Sep 28 16:23:44 h2865660 sshd[10655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.190.54
Sep 28 16:23:44 h2865660 sshd[10655]: Invalid user oratest from 51.158.190.54 port 47658
Sep 28 16:23:46 h2865660 sshd[10655]: Failed password for invalid user oratest from 51.158.190.54 port 47658 ssh2
Sep 28 16:30:52 h2865660 sshd[11016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.190.54  user=root
Sep 28 16:30:54 h2865660 sshd[11016]: Failed password for root from 51.158.190.54 port 54332 ssh2
...
2020-09-29 06:52:34
206.189.143.91 attackbotsspam
2020-09-28T21:23:58+0200 Failed SSH Authentication/Brute Force Attack.(Server 2)
2020-09-29 06:41:59
62.234.124.104 attack
vps:sshd-InvalidUser
2020-09-29 06:58:28
64.227.90.107 attackbots
(sshd) Failed SSH login from 64.227.90.107 (US/United States/-): 5 in the last 3600 secs
2020-09-29 06:35:49
124.156.136.112 attackspambots
Sep 28 22:10:30 vm1 sshd[14621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.136.112
Sep 28 22:10:32 vm1 sshd[14621]: Failed password for invalid user andres from 124.156.136.112 port 52708 ssh2
...
2020-09-29 06:43:58
192.241.238.5 attackbots
[N1.H1.VM1] Port Scanner Detected Blocked by UFW
2020-09-29 06:36:32
171.34.78.119 attack
Sep 29 01:24:53 dhoomketu sshd[3437998]: Invalid user nagios from 171.34.78.119 port 9648
Sep 29 01:24:53 dhoomketu sshd[3437998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.34.78.119 
Sep 29 01:24:53 dhoomketu sshd[3437998]: Invalid user nagios from 171.34.78.119 port 9648
Sep 29 01:24:55 dhoomketu sshd[3437998]: Failed password for invalid user nagios from 171.34.78.119 port 9648 ssh2
Sep 29 01:27:16 dhoomketu sshd[3438020]: Invalid user diana from 171.34.78.119 port 9649
...
2020-09-29 06:53:14
119.28.223.229 attackbots
2020-09-28T14:33:49.831322dmca.cloudsearch.cf sshd[2389]: Invalid user hb from 119.28.223.229 port 42976
2020-09-28T14:33:49.836174dmca.cloudsearch.cf sshd[2389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.223.229
2020-09-28T14:33:49.831322dmca.cloudsearch.cf sshd[2389]: Invalid user hb from 119.28.223.229 port 42976
2020-09-28T14:33:52.054255dmca.cloudsearch.cf sshd[2389]: Failed password for invalid user hb from 119.28.223.229 port 42976 ssh2
2020-09-28T14:36:50.845256dmca.cloudsearch.cf sshd[2439]: Invalid user kafka from 119.28.223.229 port 38094
2020-09-28T14:36:50.850243dmca.cloudsearch.cf sshd[2439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.223.229
2020-09-28T14:36:50.845256dmca.cloudsearch.cf sshd[2439]: Invalid user kafka from 119.28.223.229 port 38094
2020-09-28T14:36:53.584899dmca.cloudsearch.cf sshd[2439]: Failed password for invalid user kafka from 119.28.223.229 port 
...
2020-09-29 06:45:16
220.161.81.131 attackspambots
Time:     Sat Sep 26 13:23:01 2020 +0000
IP:       220.161.81.131 (CN/China/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 26 12:42:03 47-1 sshd[64954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.161.81.131  user=root
Sep 26 12:42:05 47-1 sshd[64954]: Failed password for root from 220.161.81.131 port 50036 ssh2
Sep 26 13:10:08 47-1 sshd[65993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.161.81.131  user=root
Sep 26 13:10:10 47-1 sshd[65993]: Failed password for root from 220.161.81.131 port 49700 ssh2
Sep 26 13:22:58 47-1 sshd[66426]: Invalid user user15 from 220.161.81.131 port 53072
2020-09-29 06:31:26
122.51.248.76 attackbotsspam
Brute%20Force%20SSH
2020-09-29 06:29:17
123.206.64.111 attackbots
2020-09-28T20:25:46.584169abusebot-6.cloudsearch.cf sshd[10741]: Invalid user dick from 123.206.64.111 port 46832
2020-09-28T20:25:46.589787abusebot-6.cloudsearch.cf sshd[10741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.64.111
2020-09-28T20:25:46.584169abusebot-6.cloudsearch.cf sshd[10741]: Invalid user dick from 123.206.64.111 port 46832
2020-09-28T20:25:48.469350abusebot-6.cloudsearch.cf sshd[10741]: Failed password for invalid user dick from 123.206.64.111 port 46832 ssh2
2020-09-28T20:29:27.208604abusebot-6.cloudsearch.cf sshd[10798]: Invalid user oracle from 123.206.64.111 port 52252
2020-09-28T20:29:27.221533abusebot-6.cloudsearch.cf sshd[10798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.64.111
2020-09-28T20:29:27.208604abusebot-6.cloudsearch.cf sshd[10798]: Invalid user oracle from 123.206.64.111 port 52252
2020-09-28T20:29:28.774830abusebot-6.cloudsearch.cf sshd[10798]: 
...
2020-09-29 07:00:49
79.124.62.82 attack
Port Scan
...
2020-09-29 07:01:52

Recently Reported IPs

3.52.173.19 217.187.138.124 118.64.22.226 184.44.194.149
90.240.158.196 154.152.110.177 48.96.57.235 197.122.126.116
82.158.115.50 245.142.130.214 145.203.74.157 164.36.234.140
55.197.66.181 209.161.0.9 210.224.66.134 236.19.145.238
176.101.202.1 214.203.204.232 9.251.212.175 205.61.10.142