Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.54.67.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42594
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.54.67.34.			IN	A

;; AUTHORITY SECTION:
.			435	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 09:13:14 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 34.67.54.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 34.67.54.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
139.162.122.110 attackbotsspam
SSH-bruteforce attempts
2019-12-06 05:51:01
180.68.177.15 attack
Dec  6 03:15:33 areeb-Workstation sshd[17425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.68.177.15 
Dec  6 03:15:36 areeb-Workstation sshd[17425]: Failed password for invalid user horinochi from 180.68.177.15 port 55202 ssh2
...
2019-12-06 05:49:38
218.92.0.184 attackspambots
2019-12-03 07:59:12 -> 2019-12-05 19:22:00 : 44 login attempts (218.92.0.184)
2019-12-06 06:11:58
72.52.128.192 attackbots
$f2bV_matches
2019-12-06 06:10:29
94.191.50.57 attack
2019-12-05T22:53:24.290488vps751288.ovh.net sshd\[13535\]: Invalid user radio from 94.191.50.57 port 41414
2019-12-05T22:53:24.299579vps751288.ovh.net sshd\[13535\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.50.57
2019-12-05T22:53:26.549039vps751288.ovh.net sshd\[13535\]: Failed password for invalid user radio from 94.191.50.57 port 41414 ssh2
2019-12-05T23:01:06.569177vps751288.ovh.net sshd\[13619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.50.57  user=root
2019-12-05T23:01:08.909060vps751288.ovh.net sshd\[13619\]: Failed password for root from 94.191.50.57 port 51292 ssh2
2019-12-06 06:13:30
5.196.110.170 attackbotsspam
Dec  5 22:03:20 * sshd[22155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.110.170
Dec  5 22:03:22 * sshd[22155]: Failed password for invalid user sybase from 5.196.110.170 port 46250 ssh2
2019-12-06 06:16:22
177.84.197.14 attackspam
Dec  5 21:59:33 zulu1842 sshd[31704]: Did not receive identification string from 177.84.197.14
Dec  5 21:59:59 zulu1842 sshd[31774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.84.197.14  user=r.r
Dec  5 22:00:01 zulu1842 sshd[31774]: Failed password for r.r from 177.84.197.14 port 34406 ssh2
Dec  5 22:00:01 zulu1842 sshd[31774]: Received disconnect from 177.84.197.14: 11: Bye Bye [preauth]
Dec  5 22:00:15 zulu1842 sshd[31821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.84.197.14  user=mysql
Dec  5 22:00:17 zulu1842 sshd[31821]: Failed password for mysql from 177.84.197.14 port 36016 ssh2
Dec  5 22:00:17 zulu1842 sshd[31821]: Received disconnect from 177.84.197.14: 11: Bye Bye [preauth]
Dec  5 22:00:28 zulu1842 sshd[31840]: Invalid user vendas from 177.84.197.14
Dec  5 22:00:28 zulu1842 sshd[31840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh r........
-------------------------------
2019-12-06 05:59:11
218.92.0.178 attackbots
2019-12-03 10:32:40 -> 2019-12-05 10:34:43 : 33 login attempts (218.92.0.178)
2019-12-06 06:10:56
101.36.151.78 attack
Dec  5 22:03:44 icinga sshd[13547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.151.78
Dec  5 22:03:46 icinga sshd[13547]: Failed password for invalid user test from 101.36.151.78 port 52224 ssh2
...
2019-12-06 05:52:11
177.10.128.157 attackbotsspam
Attempts to probe for or exploit a Drupal 7.67 site on url: /wp-login.php. Reported by the module https://www.drupal.org/project/abuseipdb.
2019-12-06 06:17:13
51.68.210.22 attackbotsspam
Port scan on 2 port(s): 139 445
2019-12-06 06:11:44
181.116.50.170 attack
$f2bV_matches
2019-12-06 06:09:11
106.13.53.173 attack
Dec  5 23:55:27 server sshd\[29570\]: Invalid user jimm from 106.13.53.173
Dec  5 23:55:27 server sshd\[29570\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.53.173 
Dec  5 23:55:29 server sshd\[29570\]: Failed password for invalid user jimm from 106.13.53.173 port 58090 ssh2
Dec  6 00:03:48 server sshd\[31753\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.53.173  user=root
Dec  6 00:03:50 server sshd\[31753\]: Failed password for root from 106.13.53.173 port 48650 ssh2
...
2019-12-06 05:48:20
42.63.167.124 attack
" "
2019-12-06 06:07:20
37.139.0.226 attackspam
Dec  5 22:26:13 vps647732 sshd[25822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.0.226
Dec  5 22:26:15 vps647732 sshd[25822]: Failed password for invalid user nv from 37.139.0.226 port 35418 ssh2
...
2019-12-06 05:50:08

Recently Reported IPs

140.255.98.28 140.29.18.175 118.89.162.192 140.255.98.178
140.43.48.49 140.66.85.212 140.71.228.158 140.65.127.107
140.68.99.14 140.75.132.52 140.32.16.24 140.75.147.197
140.75.152.2 140.75.164.111 140.75.164.138 140.6.197.35
140.75.164.123 140.75.164.140 140.75.164.106 140.75.154.215