Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.53.34.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34097
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.53.34.9.			IN	A

;; AUTHORITY SECTION:
.			588	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 13:39:54 CST 2022
;; MSG SIZE  rcvd: 104
Host info
9.34.53.159.in-addr.arpa domain name pointer taptoridenyc.com.
9.34.53.159.in-addr.arpa domain name pointer jpmorganwealthmanagement.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
9.34.53.159.in-addr.arpa	name = jpmorganwealthmanagement.com.
9.34.53.159.in-addr.arpa	name = taptoridenyc.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
14.185.110.6 attack
445/tcp
[2019-10-26]1pkt
2019-10-26 16:52:04
1.162.122.169 attackbotsspam
445/tcp
[2019-10-26]1pkt
2019-10-26 16:57:33
176.59.44.39 attackspambots
445/tcp
[2019-10-26]1pkt
2019-10-26 17:11:18
110.182.254.33 attackbots
10/25/2019-23:46:56.354679 110.182.254.33 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-10-26 17:25:03
171.7.248.34 attackbots
445/tcp
[2019-10-26]1pkt
2019-10-26 16:49:39
49.147.151.14 attackspam
445/tcp
[2019-10-26]1pkt
2019-10-26 17:00:27
88.26.223.141 attackbotsspam
445/tcp 445/tcp
[2019-09-18/10-26]2pkt
2019-10-26 16:51:31
96.45.179.236 attack
Oct 25 18:39:58 sachi sshd\[5462\]: Invalid user ter from 96.45.179.236
Oct 25 18:39:58 sachi sshd\[5462\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.45.179.236.16clouds.com
Oct 25 18:40:00 sachi sshd\[5462\]: Failed password for invalid user ter from 96.45.179.236 port 45854 ssh2
Oct 25 18:44:04 sachi sshd\[5785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.45.179.236.16clouds.com  user=root
Oct 25 18:44:06 sachi sshd\[5785\]: Failed password for root from 96.45.179.236 port 55534 ssh2
2019-10-26 16:56:56
114.116.227.30 attackbotsspam
23/tcp
[2019-10-26]1pkt
2019-10-26 16:54:06
62.234.146.45 attackspam
2019-10-26T06:41:54.268768  sshd[25063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.146.45  user=root
2019-10-26T06:41:56.492606  sshd[25063]: Failed password for root from 62.234.146.45 port 57320 ssh2
2019-10-26T07:08:12.047499  sshd[25435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.146.45  user=root
2019-10-26T07:08:14.236091  sshd[25435]: Failed password for root from 62.234.146.45 port 60114 ssh2
2019-10-26T07:13:17.693978  sshd[25476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.146.45  user=mysql
2019-10-26T07:13:19.084962  sshd[25476]: Failed password for mysql from 62.234.146.45 port 40324 ssh2
...
2019-10-26 17:20:46
70.132.33.90 attackspam
Automatic report generated by Wazuh
2019-10-26 17:22:21
79.116.187.80 attackspambots
23/tcp
[2019-10-26]1pkt
2019-10-26 17:18:06
52.192.157.100 attackspambots
slow and persistent scanner
2019-10-26 16:48:22
211.151.95.139 attackspambots
Automatic report - Banned IP Access
2019-10-26 16:49:57
49.69.171.73 attackspam
2222/tcp 2222/tcp 2222/tcp
[2019-10-26]3pkt
2019-10-26 17:14:34

Recently Reported IPs

159.53.44.60 159.53.85.184 159.53.64.61 159.53.60.93
159.53.62.247 159.53.76.246 159.53.85.137 166.160.66.137
159.54.242.176 159.63.132.30 159.54.227.131 159.54.228.48
159.53.96.78 159.53.85.185 159.65.0.4 159.65.105.237
159.65.101.137 159.65.10.135 159.65.1.7 159.65.105.241