Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Frankfurt am Main

Region: Hessen

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.93.0.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28679
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;54.93.0.106.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 08:03:06 CST 2025
;; MSG SIZE  rcvd: 104
Host info
106.0.93.54.in-addr.arpa domain name pointer ec2-54-93-0-106.eu-central-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
106.0.93.54.in-addr.arpa	name = ec2-54-93-0-106.eu-central-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
117.6.128.204 attack
Unauthorized connection attempt from IP address 117.6.128.204 on Port 445(SMB)
2020-02-15 04:28:46
180.251.116.145 attack
Unauthorized connection attempt from IP address 180.251.116.145 on Port 445(SMB)
2020-02-15 04:24:36
113.181.240.182 attackspambots
Feb 14 10:46:04 vps46666688 sshd[9856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.181.240.182
Feb 14 10:46:06 vps46666688 sshd[9856]: Failed password for invalid user admin1 from 113.181.240.182 port 52875 ssh2
...
2020-02-15 04:23:38
81.2.47.181 attackspam
postfix (unknown user, SPF fail or relay access denied)
2020-02-15 04:30:42
179.232.83.181 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 04:17:20
186.92.15.128 attack
Unauthorized connection attempt from IP address 186.92.15.128 on Port 445(SMB)
2020-02-15 04:36:12
188.32.108.72 attack
Unauthorized connection attempt from IP address 188.32.108.72 on Port 445(SMB)
2020-02-15 04:14:13
150.107.136.61 attackbotsspam
Unauthorized connection attempt from IP address 150.107.136.61 on Port 445(SMB)
2020-02-15 04:47:42
167.249.242.40 attackbots
1581690695 - 02/14/2020 15:31:35 Host: 167.249.242.40/167.249.242.40 Port: 445 TCP Blocked
2020-02-15 04:44:37
103.231.252.120 attackspam
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-02-15 04:50:56
89.189.186.45 attackbotsspam
Feb 14 00:41:34 rama sshd[833576]: Invalid user ng from 89.189.186.45
Feb 14 00:41:34 rama sshd[833576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.189.186.45.sta.211.ru 
Feb 14 00:41:35 rama sshd[833576]: Failed password for invalid user ng from 89.189.186.45 port 39938 ssh2
Feb 14 00:41:35 rama sshd[833576]: Received disconnect from 89.189.186.45: 11: Bye Bye [preauth]
Feb 14 00:47:54 rama sshd[835174]: Invalid user may from 89.189.186.45
Feb 14 00:47:54 rama sshd[835174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.189.186.45.sta.211.ru 
Feb 14 00:47:56 rama sshd[835174]: Failed password for invalid user may from 89.189.186.45 port 48452 ssh2
Feb 14 00:47:56 rama sshd[835174]: Received disconnect from 89.189.186.45: 11: Bye Bye [preauth]
Feb 14 00:49:22 rama sshd[835439]: Invalid user configure from 89.189.186.45
Feb 14 00:49:22 rama sshd[835439]: pam_unix(sshd:auth): authe........
-------------------------------
2020-02-15 04:43:52
200.69.75.194 attackspam
Unauthorized connection attempt from IP address 200.69.75.194 on Port 445(SMB)
2020-02-15 04:41:30
92.118.37.86 attackbotsspam
Fail2Ban Ban Triggered
2020-02-15 04:24:58
182.121.54.134 attack
" "
2020-02-15 04:45:59
71.6.158.166 attackspambots
02/14/2020-21:16:22.279113 71.6.158.166 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 71
2020-02-15 04:42:16

Recently Reported IPs

42.157.53.171 164.154.24.111 35.241.162.10 171.242.159.63
213.96.6.205 187.30.84.64 198.6.59.35 40.15.30.209
135.224.167.126 214.17.226.125 154.127.75.237 141.36.80.245
192.10.110.71 63.187.175.91 124.3.133.80 180.90.22.86
190.178.101.229 200.154.198.74 220.175.73.62 193.59.226.241