Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.95.85.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10228
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;54.95.85.212.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012500 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 21:21:30 CST 2025
;; MSG SIZE  rcvd: 105
Host info
212.85.95.54.in-addr.arpa domain name pointer ec2-54-95-85-212.ap-northeast-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
212.85.95.54.in-addr.arpa	name = ec2-54-95-85-212.ap-northeast-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
193.70.32.148 attack
"Fail2Ban detected SSH brute force attempt"
2019-09-01 05:42:00
179.232.1.254 attack
Sep  1 00:07:55 legacy sshd[10897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.232.1.254
Sep  1 00:07:57 legacy sshd[10897]: Failed password for invalid user waf from 179.232.1.254 port 38197 ssh2
Sep  1 00:15:16 legacy sshd[11060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.232.1.254
...
2019-09-01 06:21:22
218.29.42.220 attack
Invalid user brandt from 218.29.42.220 port 60618
2019-09-01 06:10:10
84.241.26.213 attack
Sep  1 00:53:40 taivassalofi sshd[26371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.241.26.213
Sep  1 00:53:42 taivassalofi sshd[26371]: Failed password for invalid user ncic from 84.241.26.213 port 54452 ssh2
...
2019-09-01 06:08:26
188.113.199.15 attackbotsspam
Unauthorized connection attempt from IP address 188.113.199.15 on Port 445(SMB)
2019-09-01 05:42:18
106.13.123.29 attackbotsspam
2019-08-31T21:53:56.806895abusebot-7.cloudsearch.cf sshd\[7471\]: Invalid user alex from 106.13.123.29 port 40798
2019-09-01 06:01:39
177.23.184.99 attackspam
Sep  1 00:44:13 www1 sshd\[40488\]: Invalid user amine from 177.23.184.99Sep  1 00:44:15 www1 sshd\[40488\]: Failed password for invalid user amine from 177.23.184.99 port 57474 ssh2Sep  1 00:48:50 www1 sshd\[41039\]: Invalid user nunes from 177.23.184.99Sep  1 00:48:52 www1 sshd\[41039\]: Failed password for invalid user nunes from 177.23.184.99 port 45468 ssh2Sep  1 00:53:33 www1 sshd\[41515\]: Invalid user stormy from 177.23.184.99Sep  1 00:53:34 www1 sshd\[41515\]: Failed password for invalid user stormy from 177.23.184.99 port 33468 ssh2
...
2019-09-01 06:14:01
50.64.152.76 attackbots
Aug 31 12:05:47 php2 sshd\[9570\]: Invalid user john from 50.64.152.76
Aug 31 12:05:47 php2 sshd\[9570\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=s0106bc9b68acafab.vc.shawcable.net
Aug 31 12:05:49 php2 sshd\[9570\]: Failed password for invalid user john from 50.64.152.76 port 36398 ssh2
Aug 31 12:09:57 php2 sshd\[10055\]: Invalid user hduser from 50.64.152.76
Aug 31 12:09:57 php2 sshd\[10055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=s0106bc9b68acafab.vc.shawcable.net
2019-09-01 06:19:42
157.230.248.65 attackspam
Aug 31 12:06:43 aiointranet sshd\[3253\]: Invalid user admin from 157.230.248.65
Aug 31 12:06:43 aiointranet sshd\[3253\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.248.65
Aug 31 12:06:46 aiointranet sshd\[3253\]: Failed password for invalid user admin from 157.230.248.65 port 21598 ssh2
Aug 31 12:11:13 aiointranet sshd\[4186\]: Invalid user eaf from 157.230.248.65
Aug 31 12:11:13 aiointranet sshd\[4186\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.248.65
2019-09-01 06:11:25
183.82.121.34 attackbotsspam
2019-08-31T21:38:36.473898abusebot-3.cloudsearch.cf sshd\[18540\]: Invalid user admin from 183.82.121.34 port 59492
2019-09-01 05:53:50
179.214.179.1 attack
Aug 31 22:07:54 web8 sshd\[31149\]: Invalid user demouser from 179.214.179.1
Aug 31 22:07:54 web8 sshd\[31149\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.214.179.1
Aug 31 22:07:56 web8 sshd\[31149\]: Failed password for invalid user demouser from 179.214.179.1 port 39438 ssh2
Aug 31 22:14:57 web8 sshd\[2623\]: Invalid user i from 179.214.179.1
Aug 31 22:14:57 web8 sshd\[2623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.214.179.1
2019-09-01 06:21:36
138.201.243.66 attackspam
22 attempts against mh_ha-misbehave-ban on lb.any-lamp.com
2019-09-01 05:46:36
139.59.180.53 attackbotsspam
Aug 31 23:49:02 minden010 sshd[21272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.180.53
Aug 31 23:49:03 minden010 sshd[21272]: Failed password for invalid user test from 139.59.180.53 port 60274 ssh2
Aug 31 23:53:58 minden010 sshd[22927]: Failed password for root from 139.59.180.53 port 47356 ssh2
...
2019-09-01 05:59:48
5.39.67.154 attack
Aug 31 23:53:58 icinga sshd[32058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.67.154
Aug 31 23:54:00 icinga sshd[32058]: Failed password for invalid user ruben from 5.39.67.154 port 37716 ssh2
...
2019-09-01 05:59:29
36.110.50.217 attackbots
Aug 31 23:48:32 eventyay sshd[20496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.50.217
Aug 31 23:48:34 eventyay sshd[20496]: Failed password for invalid user gast. from 36.110.50.217 port 43342 ssh2
Aug 31 23:53:55 eventyay sshd[21746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.50.217
...
2019-09-01 06:03:39

Recently Reported IPs

142.72.21.165 253.37.165.254 240.72.147.184 218.139.175.212
218.40.108.72 237.148.196.113 237.30.52.242 91.147.104.53
230.148.32.111 130.37.95.53 21.63.249.175 89.4.78.27
48.65.148.172 61.236.190.228 142.208.0.110 206.41.223.99
205.87.123.67 225.201.209.173 206.74.102.151 74.116.115.84