Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ho Chi Minh City

Region: Ho Chi Minh

Country: Vietnam

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.54.125.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45005
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.54.125.34.			IN	A

;; AUTHORITY SECTION:
.			379	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011801 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 19 04:29:37 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 34.125.54.1.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 34.125.54.1.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
139.59.4.224 attackspambots
Unauthorized connection attempt detected from IP address 139.59.4.224 to port 2220 [J]
2020-01-11 23:58:58
222.186.175.154 attackbotsspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154  user=root
Failed password for root from 222.186.175.154 port 11484 ssh2
Failed password for root from 222.186.175.154 port 11484 ssh2
Failed password for root from 222.186.175.154 port 11484 ssh2
Failed password for root from 222.186.175.154 port 11484 ssh2
2020-01-11 23:35:31
62.234.73.104 attackbots
Unauthorized connection attempt detected from IP address 62.234.73.104 to port 2220 [J]
2020-01-11 23:54:57
139.59.56.121 attack
Jan 11 16:53:33 host sshd[60179]: Invalid user www-data from 139.59.56.121 port 39342
...
2020-01-11 23:57:02
125.212.177.18 attackspam
firewall-block, port(s): 8291/tcp
2020-01-11 23:33:33
139.59.34.17 attackbotsspam
$f2bV_matches
2020-01-12 00:01:16
207.154.206.75 attack
Wordpress XMLRPC attack
2020-01-11 23:55:22
170.106.64.219 attackspam
" "
2020-01-11 23:40:40
139.99.221.61 attack
$f2bV_matches
2020-01-11 23:46:20
140.143.206.137 attackspam
Jan 11 15:42:58 vpn01 sshd[24173]: Failed password for root from 140.143.206.137 port 57502 ssh2
...
2020-01-11 23:21:55
203.114.109.57 attackbotsspam
Jan 11 14:08:02 silence02 sshd[2057]: Failed password for daemon from 203.114.109.57 port 44668 ssh2
Jan 11 14:10:11 silence02 sshd[2123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.114.109.57
Jan 11 14:10:13 silence02 sshd[2123]: Failed password for invalid user zimbra from 203.114.109.57 port 36424 ssh2
2020-01-11 23:36:49
14.225.3.47 attackbots
Triggered by Fail2Ban at Ares web server
2020-01-11 23:33:56
191.245.68.98 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-11 23:33:13
139.59.248.5 attackspam
ssh failed login
2020-01-12 00:01:51
130.61.57.37 attackspambots
Unauthorized connection attempt detected from IP address 130.61.57.37 to port 2220 [J]
2020-01-11 23:56:32

Recently Reported IPs

178.162.156.42 10.211.9.23 203.143.230.68 78.59.67.246
138.68.91.222 75.158.165.104 37.237.34.57 112.211.255.159
255.13.82.114 110.189.223.195 10.215.119.6 196.145.168.19
166.170.164.149 115.63.107.51 198.68.156.20 122.73.21.227
13.220.62.144 149.62.60.209 192.2.8.164 247.4.122.139