Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ashburn

Region: Virginia

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Amazon.com, Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.82.146.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39859
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;54.82.146.148.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019043000 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Wed May 01 00:20:40 +08 2019
;; MSG SIZE  rcvd: 117

Host info
148.146.82.54.in-addr.arpa domain name pointer ec2-54-82-146-148.compute-1.amazonaws.com.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
148.146.82.54.in-addr.arpa	name = ec2-54-82-146-148.compute-1.amazonaws.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
157.245.104.153 attackspam
Sep 28 18:39:26 MainVPS sshd[20883]: Invalid user support from 157.245.104.153 port 37358
Sep 28 18:39:26 MainVPS sshd[20883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.104.153
Sep 28 18:39:26 MainVPS sshd[20883]: Invalid user support from 157.245.104.153 port 37358
Sep 28 18:39:27 MainVPS sshd[20883]: Failed password for invalid user support from 157.245.104.153 port 37358 ssh2
Sep 28 18:44:20 MainVPS sshd[21261]: Invalid user kayden from 157.245.104.153 port 50472
...
2019-09-29 01:35:14
79.109.239.218 attackspambots
F2B jail: sshd. Time: 2019-09-28 19:34:49, Reported by: VKReport
2019-09-29 01:45:59
183.82.118.179 attackspam
Unauthorized connection attempt from IP address 183.82.118.179 on Port 445(SMB)
2019-09-29 01:29:10
188.50.163.169 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 28-09-2019 13:30:21.
2019-09-29 01:38:43
93.189.149.248 attack
2019-09-28T17:44:59.523808abusebot-4.cloudsearch.cf sshd\[25528\]: Invalid user user from 93.189.149.248 port 42484
2019-09-29 01:50:39
182.64.160.190 attackbotsspam
Unauthorized connection attempt from IP address 182.64.160.190 on Port 445(SMB)
2019-09-29 01:44:17
60.169.222.61 attack
2019-09-28T13:29:28.636732beta postfix/smtpd[6449]: NOQUEUE: reject: RCPT from unknown[60.169.222.61]: 450 4.7.1 Client host rejected: cannot find your reverse hostname, [60.169.222.61]; from= to= proto=ESMTP helo=
2019-09-28T13:29:35.336280beta postfix/smtpd[6449]: NOQUEUE: reject: RCPT from unknown[60.169.222.61]: 450 4.7.1 Client host rejected: cannot find your reverse hostname, [60.169.222.61]; from= to= proto=ESMTP helo=
2019-09-28T13:30:09.784862beta postfix/smtpd[6449]: NOQUEUE: reject: RCPT from unknown[60.169.222.61]: 450 4.7.1 Client host rejected: cannot find your reverse hostname, [60.169.222.61]; from= to= proto=ESMTP helo=
...
2019-09-29 01:54:59
201.20.86.229 attackbots
Unauthorized connection attempt from IP address 201.20.86.229 on Port 445(SMB)
2019-09-29 01:13:21
109.238.222.62 attack
postfix (unknown user, SPF fail or relay access denied)
2019-09-29 01:22:28
103.27.202.18 attackbotsspam
Sep 28 07:07:54 web9 sshd\[32419\]: Invalid user Oyster from 103.27.202.18
Sep 28 07:07:54 web9 sshd\[32419\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.27.202.18
Sep 28 07:07:56 web9 sshd\[32419\]: Failed password for invalid user Oyster from 103.27.202.18 port 59080 ssh2
Sep 28 07:12:33 web9 sshd\[877\]: Invalid user valvoja from 103.27.202.18
Sep 28 07:12:33 web9 sshd\[877\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.27.202.18
2019-09-29 01:45:05
85.214.254.74 attack
Invalid user wirac2304 from 85.214.254.74 port 20745
2019-09-29 01:18:39
160.153.154.6 attackbotsspam
xmlrpc attack
2019-09-29 01:20:02
113.97.32.76 attack
Unauthorized connection attempt from IP address 113.97.32.76 on Port 445(SMB)
2019-09-29 01:26:29
106.12.206.53 attackspambots
Sep 28 17:37:06 microserver sshd[35739]: Invalid user liliwang from 106.12.206.53 port 33644
Sep 28 17:37:06 microserver sshd[35739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.206.53
Sep 28 17:37:08 microserver sshd[35739]: Failed password for invalid user liliwang from 106.12.206.53 port 33644 ssh2
Sep 28 17:42:33 microserver sshd[36444]: Invalid user judy from 106.12.206.53 port 36216
Sep 28 17:42:33 microserver sshd[36444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.206.53
Sep 28 17:53:33 microserver sshd[37895]: Invalid user admin from 106.12.206.53 port 41384
Sep 28 17:53:33 microserver sshd[37895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.206.53
Sep 28 17:53:35 microserver sshd[37895]: Failed password for invalid user admin from 106.12.206.53 port 41384 ssh2
Sep 28 17:59:02 microserver sshd[38656]: Invalid user soporte from 106.12.206.53 port 4398
2019-09-29 01:22:57
1.195.108.214 attackspambots
Unauthorized connection attempt from IP address 1.195.108.214 on Port 445(SMB)
2019-09-29 01:19:07

Recently Reported IPs

103.77.137.143 138.212.62.116 14.253.239.245 55.90.172.56
103.210.120.19 69.197.64.200 185.220.221.224 167.99.104.92
68.232.200.131 103.194.90.125 38.38.219.173 23.250.44.220
214.145.224.157 46.105.120.65 1.41.168.12 110.33.170.99
117.80.20.213 42.53.251.35 153.105.98.178 189.11.197.154