Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ha Nam

Region: Tinh Thanh Hoa

Country: Vietnam

Internet Service Provider: unknown

Hostname: unknown

Organization: Viettel Group

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.107.59.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22058
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;116.107.59.34.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041000 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Wed Apr 10 15:32:39 +08 2019
;; MSG SIZE  rcvd: 117

Host info
Host 34.59.107.116.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 67.207.67.3, trying next server
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 34.59.107.116.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
213.108.134.146 attack
RDP Bruteforce
2020-09-19 16:33:46
77.121.92.243 attackbotsspam
RDP Bruteforce
2020-09-19 16:37:47
62.99.90.10 attackspam
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-09-19T07:21:47Z and 2020-09-19T07:48:22Z
2020-09-19 16:14:08
222.186.175.212 attackspambots
Sep 19 10:35:13 server sshd[37462]: Failed none for root from 222.186.175.212 port 32610 ssh2
Sep 19 10:35:16 server sshd[37462]: Failed password for root from 222.186.175.212 port 32610 ssh2
Sep 19 10:35:21 server sshd[37462]: Failed password for root from 222.186.175.212 port 32610 ssh2
2020-09-19 16:39:52
59.120.227.134 attackbots
SSH Brute-Force reported by Fail2Ban
2020-09-19 16:04:50
124.219.170.125 attack
Unauthorized connection attempt from IP address 124.219.170.125 on Port 445(SMB)
2020-09-19 16:29:09
37.59.48.181 attack
Sep 18 18:00:14 gospond sshd[16346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.48.181  user=root
Sep 18 18:00:15 gospond sshd[16346]: Failed password for root from 37.59.48.181 port 45922 ssh2
...
2020-09-19 16:24:19
157.119.250.57 attackbotsspam
5977/tcp 5974/tcp 5959/tcp...
[2020-07-19/09-18]125pkt,40pt.(tcp)
2020-09-19 16:31:24
106.54.117.51 attackbots
Invalid user maria from 106.54.117.51 port 58034
2020-09-19 16:06:20
103.146.23.105 attackbotsspam
Unauthorized connection attempt from IP address 103.146.23.105 on Port 445(SMB)
2020-09-19 16:20:56
14.174.252.219 attack
Unauthorized connection attempt from IP address 14.174.252.219 on Port 445(SMB)
2020-09-19 16:38:42
222.221.246.114 attack
Email rejected due to spam filtering
2020-09-19 15:59:26
152.250.243.148 attack
Automatic report - Port Scan Attack
2020-09-19 16:01:34
40.122.149.176 attackspambots
SSH break in attempt
...
2020-09-19 16:30:24
12.165.80.213 attack
RDP Bruteforce
2020-09-19 16:39:31

Recently Reported IPs

31.167.20.193 110.77.140.26 213.79.119.42 103.108.145.72
103.88.33.61 221.229.174.143 125.166.210.56 122.152.210.200
162.243.143.0 223.196.87.14 77.120.247.247 185.2.5.10
110.54.198.234 162.243.142.246 182.253.118.152 177.189.36.89
134.249.160.35 36.89.234.23 203.115.97.18 202.112.237.228