AbuseIPDB » 54.92.193.233

54.92.193.233 was found in our database!

This IP was reported 53 times. Confidence of Abuse is 100%: ?

100%
ISP Amazon Data Services NoVa
Usage Type Data Center/Web Hosting/Transit
ASN AS14618
Hostname(s) ec2-54-92-193-233.compute-1.amazonaws.com
Domain Name amazon.com
Country United States of America
City Ashburn, Virginia

IP info including ISP, Usage Type, and Location provided by IPInfo. Updated biweekly.

IP Abuse Reports for 54.92.193.233:

This IP address has been reported a total of 53 times from 39 distinct sources. 54.92.193.233 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter IoA Timestamp in UTC Comment Categories
ozisp.com.au
Hacking
ras07
SSH login attempts with user root.
Brute-Force SSH
LockBlock
2025-06-13 03:01:15: Port scan detected from 54.92.193.233 on port 22 of racknerd-e7e1a9
Port Scan SSH
ThreatBook.io
ThreatBook Intelligence: IDC more details on http://threatbook.io/ip/54.92.193.233
SSH
30p87
Brute-Force SSH
Anonymous
Drop from IP address 54.92.193.233 to tcp-port 80
Port Scan
StopAbuse
tcp/22
Port Scan SSH
Study Bitcoin 🤗
SSH Fail2Ban [srv67]
Brute-Force
Study Bitcoin 🤗
3 port probes: 3x tcp/8443
[srv126,srv130,srv128]
Port Scan
banankicks
Brute-Force Exploited Host
adnscom.net
IPS trigger: Brute force SSH scanning/attack
Brute-Force SSH
mielkan.com
| blocked | mielkan [1244/tcp] | source port: 45486 | ttl: 111 | packet length: 60 | tos: 0x00 |
Port Scan
Mr.Singh
NFT blocked 54.92.193.233 on 10-Jun-2025..
Port Scan Brute-Force
rscott.us
SSH login attempts with user root.
Brute-Force SSH
banankicks
Brute-Force Exploited Host

Showing 1 to 15 of 53 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs: