Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.53.34.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42881
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.53.34.8.			IN	A

;; AUTHORITY SECTION:
.			118	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 13:39:52 CST 2022
;; MSG SIZE  rcvd: 104
Host info
8.34.53.159.in-addr.arpa domain name pointer xign.org.
8.34.53.159.in-addr.arpa domain name pointer xign.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
8.34.53.159.in-addr.arpa	name = xign.org.
8.34.53.159.in-addr.arpa	name = xign.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
138.197.89.212 attackspam
Aug 23 10:06:16 root sshd[30968]: Failed password for root from 138.197.89.212 port 48832 ssh2
Aug 23 10:11:38 root sshd[31694]: Failed password for root from 138.197.89.212 port 47716 ssh2
...
2020-08-23 16:35:33
192.241.175.48 attackspam
Aug 23 09:35:15 [host] sshd[16277]: pam_unix(sshd:
Aug 23 09:35:18 [host] sshd[16277]: Failed passwor
Aug 23 09:36:49 [host] sshd[16335]: pam_unix(sshd:
2020-08-23 16:04:55
183.160.212.217 attack
Email rejected due to spam filtering
2020-08-23 16:22:32
51.195.53.6 attack
2020-08-23T13:08:20.053173hostname sshd[12342]: Invalid user kanishk from 51.195.53.6 port 48678
2020-08-23T13:08:22.112183hostname sshd[12342]: Failed password for invalid user kanishk from 51.195.53.6 port 48678 ssh2
2020-08-23T13:14:08.093177hostname sshd[13936]: Invalid user cgg from 51.195.53.6 port 56166
...
2020-08-23 16:20:50
120.192.21.84 attackbots
 TCP (SYN) 120.192.21.84:50580 -> port 22, len 40
2020-08-23 16:40:46
189.112.90.132 attackspam
SSH_scan
2020-08-23 16:11:43
81.17.80.162 attackspam
SMB Server BruteForce Attack
2020-08-23 16:44:03
185.176.27.46 attackbots
[H1.VM2] Blocked by UFW
2020-08-23 16:32:41
159.203.165.156 attackbots
Aug 23 10:27:22 home sshd[3626273]: Invalid user ana from 159.203.165.156 port 41834
Aug 23 10:27:22 home sshd[3626273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.165.156 
Aug 23 10:27:22 home sshd[3626273]: Invalid user ana from 159.203.165.156 port 41834
Aug 23 10:27:24 home sshd[3626273]: Failed password for invalid user ana from 159.203.165.156 port 41834 ssh2
Aug 23 10:31:00 home sshd[3627733]: Invalid user francis from 159.203.165.156 port 50228
...
2020-08-23 16:39:13
106.13.31.93 attackspambots
Invalid user za from 106.13.31.93 port 54670
2020-08-23 16:18:21
134.175.2.7 attackspam
Invalid user mozilla from 134.175.2.7 port 55598
2020-08-23 16:25:42
128.199.169.90 attackbots
Invalid user deployer from 128.199.169.90 port 35658
2020-08-23 16:06:01
106.52.6.92 attackspam
SSH brute-force attempt
2020-08-23 16:03:26
130.185.155.34 attackbotsspam
Aug 23 07:28:27 scw-6657dc sshd[12769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.185.155.34
Aug 23 07:28:27 scw-6657dc sshd[12769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.185.155.34
Aug 23 07:28:29 scw-6657dc sshd[12769]: Failed password for invalid user eko from 130.185.155.34 port 36566 ssh2
...
2020-08-23 16:05:25
112.85.42.185 attackbotsspam
Aug 23 10:06:13 ift sshd\[41796\]: Failed password for root from 112.85.42.185 port 45974 ssh2Aug 23 10:06:16 ift sshd\[41796\]: Failed password for root from 112.85.42.185 port 45974 ssh2Aug 23 10:06:18 ift sshd\[41796\]: Failed password for root from 112.85.42.185 port 45974 ssh2Aug 23 10:09:24 ift sshd\[42096\]: Failed password for root from 112.85.42.185 port 46016 ssh2Aug 23 10:11:03 ift sshd\[42464\]: Failed password for root from 112.85.42.185 port 16756 ssh2
...
2020-08-23 16:06:24

Recently Reported IPs

159.53.117.67 159.53.44.60 159.53.34.9 159.53.85.184
159.53.64.61 159.53.60.93 159.53.62.247 159.53.76.246
159.53.85.137 166.160.66.137 159.54.242.176 159.63.132.30
159.54.227.131 159.54.228.48 159.53.96.78 159.53.85.185
159.65.0.4 159.65.105.237 159.65.101.137 159.65.10.135